&(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x116c) 07:43:29 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, 0x0, 0x0, 0x0, 0x1100) 07:43:29 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:29 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1174) 07:43:29 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x0, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:29 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, 0x0, 0x0, 0x0, 0x1100) 07:43:29 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x0, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:29 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 07:43:29 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x117a) 07:43:29 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 07:43:29 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x0, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x11ef) 07:43:29 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 07:43:29 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:29 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x200100, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:29 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(0x0, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) gettid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_INPUT2(r1, &(0x7f0000000040)={0xc, {0xac, "5cf52a6c5bf65ee89f050ed8da55e3f36bdefc269754a68d3e01f39573c02a96389e3a9c48ec9102b8c5d58bfc1638c19dc9a92a68786ef326f020a72508a13576c9c9567d38f53ad1f69f881ac2709769518d3b118032ff635c2fe3b47b0dec596eafe64e0610e43edee43c236a3251a8d44e37fbd8ef2d83ee8c0578c890f46553a3ea771d43bd7d3473243233b3fa69a919c770cfbc92a7ddb4bac62458227fc9ce19f66c22e86b9749f7"}}, 0xb2) clone(0x200600, &(0x7f0000001c40)="df99bd1a43ca8cce1cba7d5a4f389aadd5f96edc2e8d5e80e35d269aa7cec9911d275d8001a3fe7a710d9bc1cbd6e20975b49d7007c7d44c37e6f3ff456a3892155c090dfc8716fb41500b1bc51467038a3a281af6a94f42a7ecee6987bf9433539d0dcae1a878bc6c3d22dbc3767d061931eb10095364", &(0x7f0000001cc0), &(0x7f0000001d00), &(0x7f0000001d40)="5027de6b442953ca13aea27dd2ec139b3bb2e58ea1ac7abad8506a27ece85f01576c9663c7ce5e23cdf5eee3265da4c37ac30b81bc200b3587c2fd3a4f97f5a04f212018453455c25c27143639a58d759b29b6c6577e59a8dbaaea30c8ed64879010046794d6558ecf54ab71081794761ed1001b10bb9a39bf49b19eae8e2c1b6809230caeba75218b38a9dc621ab0bec5a45ec1807482d1931502b8a8d7bca5233869018f396fc33c5c96104e8fba1cc41329bfef05c6638eda7e535e64797abdf26e37b003f29f639c3b9577cd1f9239e1b32524") r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) clock_gettime(0x0, &(0x7f0000001b80)={0x0, 0x0}) umount2(&(0x7f0000001c00)='./file0\x00', 0x0) recvmmsg(r1, &(0x7f0000001ac0)=[{{&(0x7f0000000200)=@phonet, 0x80, &(0x7f0000000280)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, &(0x7f0000001340)=""/203, 0xcb}, 0xfffffffd}, {{&(0x7f0000001440)=@tipc=@id, 0x80, &(0x7f00000002c0)=[{&(0x7f00000014c0)=""/188, 0xbc}, {&(0x7f0000001580)=""/140, 0x8c}, {&(0x7f0000001640)=""/246, 0xf6}], 0x3, &(0x7f0000001740)=""/48, 0x30}, 0x3de4}, {{&(0x7f0000001780)=@can, 0x80, &(0x7f0000001a80)=[{&(0x7f0000001800)=""/173, 0xad}, {&(0x7f00000018c0)=""/3, 0x3}, {&(0x7f0000001900)=""/191, 0xbf}, {&(0x7f00000019c0)=""/155, 0x9b}], 0x4}, 0x1}], 0x3, 0x2000, &(0x7f0000001bc0)={r3, r4+10000000}) 07:43:29 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(0x0, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:29 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x200100, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(0x0, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:29 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) mmap(&(0x7f00002d4000/0x3000)=nil, 0x3000, 0x2000001, 0x10010, r0, 0x6e6cd000) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) gettid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_INPUT2(r1, &(0x7f0000000040)={0xc, {0xac, "5cf52a6c5bf65ee89f050ed8da55e3f36bdefc269754a68d3e01f39573c02a96389e3a9c48ec9102b8c5d58bfc1638c19dc9a92a68786ef326f020a72508a13576c9c9567d38f53ad1f69f881ac2709769518d3b118032ff635c2fe3b47b0dec596eafe64e0610e43edee43c236a3251a8d44e37fbd8ef2d83ee8c0578c890f46553a3ea771d43bd7d3473243233b3fa69a919c770cfbc92a7ddb4bac62458227fc9ce19f66c22e86b9749f7"}}, 0xb2) clone(0x200600, &(0x7f0000001c40)="df99bd1a43ca8cce1cba7d5a4f389aadd5f96edc2e8d5e80e35d269aa7cec9911d275d8001a3fe7a710d9bc1cbd6e20975b49d7007c7d44c37e6f3ff456a3892155c090dfc8716fb41500b1bc51467038a3a281af6a94f42a7ecee6987bf9433539d0dcae1a878bc6c3d22dbc3767d061931eb10095364", &(0x7f0000001cc0), &(0x7f0000001d00), &(0x7f0000001d40)="5027de6b442953ca13aea27dd2ec139b3bb2e58ea1ac7abad8506a27ece85f01576c9663c7ce5e23cdf5eee3265da4c37ac30b81bc200b3587c2fd3a4f97f5a04f212018453455c25c27143639a58d759b29b6c6577e59a8dbaaea30c8ed64879010046794d6558ecf54ab71081794761ed1001b10bb9a39bf49b19eae8e2c1b6809230caeba75218b38a9dc621ab0bec5a45ec1807482d1931502b8a8d7bca5233869018f396fc33c5c96104e8fba1cc41329bfef05c6638eda7e535e64797abdf26e37b003f29f639c3b9577cd1f9239e1b32524") r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) clock_gettime(0x0, &(0x7f0000001b80)={0x0, 0x0}) umount2(&(0x7f0000001c00)='./file0\x00', 0x0) recvmmsg(r1, &(0x7f0000001ac0)=[{{&(0x7f0000000200)=@phonet, 0x80, &(0x7f0000000280)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, &(0x7f0000001340)=""/203, 0xcb}, 0xfffffffd}, {{&(0x7f0000001440)=@tipc=@id, 0x80, &(0x7f00000002c0)=[{&(0x7f00000014c0)=""/188, 0xbc}, {&(0x7f0000001580)=""/140, 0x8c}, {&(0x7f0000001640)=""/246, 0xf6}], 0x3, &(0x7f0000001740)=""/48, 0x30}, 0x3de4}, {{&(0x7f0000001780)=@can, 0x80, &(0x7f0000001a80)=[{&(0x7f0000001800)=""/173, 0xad}, {&(0x7f00000018c0)=""/3, 0x3}, {&(0x7f0000001900)=""/191, 0xbf}, {&(0x7f00000019c0)=""/155, 0x9b}], 0x4}, 0x1}], 0x3, 0x2000, &(0x7f0000001bc0)={r3, r4+10000000}) 07:43:29 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:29 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) gettid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_INPUT2(r1, &(0x7f0000000040)={0xc, {0xac, "5cf52a6c5bf65ee89f050ed8da55e3f36bdefc269754a68d3e01f39573c02a96389e3a9c48ec9102b8c5d58bfc1638c19dc9a92a68786ef326f020a72508a13576c9c9567d38f53ad1f69f881ac2709769518d3b118032ff635c2fe3b47b0dec596eafe64e0610e43edee43c236a3251a8d44e37fbd8ef2d83ee8c0578c890f46553a3ea771d43bd7d3473243233b3fa69a919c770cfbc92a7ddb4bac62458227fc9ce19f66c22e86b9749f7"}}, 0xb2) clone(0x200600, &(0x7f0000001c40)="df99bd1a43ca8cce1cba7d5a4f389aadd5f96edc2e8d5e80e35d269aa7cec9911d275d8001a3fe7a710d9bc1cbd6e20975b49d7007c7d44c37e6f3ff456a3892155c090dfc8716fb41500b1bc51467038a3a281af6a94f42a7ecee6987bf9433539d0dcae1a878bc6c3d22dbc3767d061931eb10095364", &(0x7f0000001cc0), &(0x7f0000001d00), &(0x7f0000001d40)="5027de6b442953ca13aea27dd2ec139b3bb2e58ea1ac7abad8506a27ece85f01576c9663c7ce5e23cdf5eee3265da4c37ac30b81bc200b3587c2fd3a4f97f5a04f212018453455c25c27143639a58d759b29b6c6577e59a8dbaaea30c8ed64879010046794d6558ecf54ab71081794761ed1001b10bb9a39bf49b19eae8e2c1b6809230caeba75218b38a9dc621ab0bec5a45ec1807482d1931502b8a8d7bca5233869018f396fc33c5c96104e8fba1cc41329bfef05c6638eda7e535e64797abdf26e37b003f29f639c3b9577cd1f9239e1b32524") r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) clock_gettime(0x0, &(0x7f0000001b80)={0x0, 0x0}) umount2(&(0x7f0000001c00)='./file0\x00', 0x0) recvmmsg(r1, &(0x7f0000001ac0)=[{{&(0x7f0000000200)=@phonet, 0x80, &(0x7f0000000280)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, &(0x7f0000001340)=""/203, 0xcb}, 0xfffffffd}, {{&(0x7f0000001440)=@tipc=@id, 0x80, &(0x7f00000002c0)=[{&(0x7f00000014c0)=""/188, 0xbc}, {&(0x7f0000001580)=""/140, 0x8c}, {&(0x7f0000001640)=""/246, 0xf6}], 0x3, &(0x7f0000001740)=""/48, 0x30}, 0x3de4}, {{&(0x7f0000001780)=@can, 0x80, &(0x7f0000001a80)=[{&(0x7f0000001800)=""/173, 0xad}, {&(0x7f00000018c0)=""/3, 0x3}, {&(0x7f0000001900)=""/191, 0xbf}, {&(0x7f00000019c0)=""/155, 0x9b}], 0x4}, 0x1}], 0x3, 0x2000, &(0x7f0000001bc0)={r3, r4+10000000}) 07:43:29 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000f40)={'ip_vti0\x00', &(0x7f0000000f00)={'gretap0\x00', 0x0, 0x40, 0x1, 0x438, 0x7, {{0x8, 0x4, 0x1, 0x12, 0x20, 0x65, 0x0, 0x0, 0x4, 0x0, @broadcast, @multicast2, {[@noop, @timestamp={0x44, 0x8, 0xe3, 0x0, 0x4, [0x5]}]}}}}}) sendmsg$nl_route_sched(r0, &(0x7f0000001000)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)=@gettfilter={0x2c, 0x2e, 0x200, 0x70bd25, 0x25dfdbfb, {0x0, 0x0, 0x0, r1, {0xfff1, 0x7}, {0x5, 0x6}, {0xfff1, 0x10}}, [{0x8, 0xb, 0x7}]}, 0x2c}, 0x1, 0x0, 0x0, 0x200408d1}, 0x8000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, 0x0, 0x0, 0x0, 0x1100) 07:43:29 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) dup2(r1, r2) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r3 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) gettid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_INPUT2(r1, &(0x7f0000000040)={0xc, {0xac, "5cf52a6c5bf65ee89f050ed8da55e3f36bdefc269754a68d3e01f39573c02a96389e3a9c48ec9102b8c5d58bfc1638c19dc9a92a68786ef326f020a72508a13576c9c9567d38f53ad1f69f881ac2709769518d3b118032ff635c2fe3b47b0dec596eafe64e0610e43edee43c236a3251a8d44e37fbd8ef2d83ee8c0578c890f46553a3ea771d43bd7d3473243233b3fa69a919c770cfbc92a7ddb4bac62458227fc9ce19f66c22e86b9749f7"}}, 0xb2) clone(0x200600, &(0x7f0000001c40)="df99bd1a43ca8cce1cba7d5a4f389aadd5f96edc2e8d5e80e35d269aa7cec9911d275d8001a3fe7a710d9bc1cbd6e20975b49d7007c7d44c37e6f3ff456a3892155c090dfc8716fb41500b1bc51467038a3a281af6a94f42a7ecee6987bf9433539d0dcae1a878bc6c3d22dbc3767d061931eb10095364", &(0x7f0000001cc0), &(0x7f0000001d00), &(0x7f0000001d40)="5027de6b442953ca13aea27dd2ec139b3bb2e58ea1ac7abad8506a27ece85f01576c9663c7ce5e23cdf5eee3265da4c37ac30b81bc200b3587c2fd3a4f97f5a04f212018453455c25c27143639a58d759b29b6c6577e59a8dbaaea30c8ed64879010046794d6558ecf54ab71081794761ed1001b10bb9a39bf49b19eae8e2c1b6809230caeba75218b38a9dc621ab0bec5a45ec1807482d1931502b8a8d7bca5233869018f396fc33c5c96104e8fba1cc41329bfef05c6638eda7e535e64797abdf26e37b003f29f639c3b9577cd1f9239e1b32524") r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) clock_gettime(0x0, &(0x7f0000001b80)={0x0, 0x0}) umount2(&(0x7f0000001c00)='./file0\x00', 0x0) recvmmsg(r1, &(0x7f0000001ac0)=[{{&(0x7f0000000200)=@phonet, 0x80, &(0x7f0000000280)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, &(0x7f0000001340)=""/203, 0xcb}, 0xfffffffd}, {{&(0x7f0000001440)=@tipc=@id, 0x80, &(0x7f00000002c0)=[{&(0x7f00000014c0)=""/188, 0xbc}, {&(0x7f0000001580)=""/140, 0x8c}, {&(0x7f0000001640)=""/246, 0xf6}], 0x3, &(0x7f0000001740)=""/48, 0x30}, 0x3de4}, {{&(0x7f0000001780)=@can, 0x80, &(0x7f0000001a80)=[{&(0x7f0000001800)=""/173, 0xad}, {&(0x7f00000018c0)=""/3, 0x3}, {&(0x7f0000001900)=""/191, 0xbf}, {&(0x7f00000019c0)=""/155, 0x9b}], 0x4}, 0x1}], 0x3, 0x2000, &(0x7f0000001bc0)={r3, r4+10000000}) 07:43:29 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:29 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, 0x0, 0x0, 0x0, 0x1100) 07:43:30 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:30 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x10, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x8, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x29, 0x4, 0xfc, 0x6, 0x70, @mcast2, @mcast2, 0x1, 0x80, 0xfffffff9, 0xcd66}}) read$FUSE(r0, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000002380)=@bridge_getlink={0xd4, 0x12, 0x200, 0x70bd26, 0x25dfdbfc, {0x7, 0x0, 0x0, r2, 0x1, 0x102}, [@IFLA_LINKMODE={0x5}, @IFLA_MTU={0x8, 0x4, 0x4}, @IFLA_WEIGHT={0x8, 0xf, 0xff}, @IFLA_EVENT={0x8, 0x2c, 0x4893}, @IFLA_NET_NS_PID={0x8, 0x13, r3}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0xfb16}, @IFLA_PORT_SELF={0x84, 0x19, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x75, 0x2, '\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8'}, @IFLA_PORT_VF={0x8, 0x1, 0xfff}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x4000}, 0x40) sendmmsg(r0, &(0x7f00000002c0), 0x0, 0x24000050) 07:43:30 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, 0x0, 0x0, 0x0, 0x1100) 07:43:30 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 07:43:30 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000300)={0xa, {0x8}}, 0xa) close(r0) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:30 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 07:43:30 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002100200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="07673d01cdd6309c41351bf3c2fab4300a1397a35a71bfe98b266414179aecf4ec30312af89fb19c8a073336bda008780e1c61fc"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, 0x0, 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:30 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 07:43:30 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, 0x0, 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="832eff96439585026d9d2f683c462cc7c871e29d8be8db47e91b13a650f419059b8efbe51cec88ea919eeef21afbbb6ca3407c07b3ebd4fccb89caadd3961ebffe6232eb94a145a8f895a3c62cf26dbefe02a206ad0139431cc39e4b0d2ed0dfdadd845902dd75ca0107e37ab3e8905b4281f70900000000000000a74caaf92688dd4b5bc70e59443ddac35dd8fcdce15d2891626aa4e275f92bed04575a6db446ec661d3cbb55b05e7b71683fd685a5bd5ffd8042462a21c79c62"], 0xd8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) fcntl$getflags(r2, 0x408) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, 0x0, 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) pipe(0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:30 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:30 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:30 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x2) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r1, r0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="8705824201b70f85b443b5ec80aedb2cc9cb8138ca12a5a8b9dfb531dfb5e2778127957405d273433bcb1321060cf137c7d55d8d58880c9178adf9bf3a7c88cec633029fdf161268d67693b6c145c3fc4456c22c677e1fa79765fc554abfb8e4fc5e6acfea07d42f45aafec60ec83eb8e45b5d5ee0be4e45e48ebaaadfec9ce9d1085cdd0995e42161fbe1a901be1fc3d3c180ca3a0949439a715cfd6a2ee72ca4d700b27916288c8cdd18659c8f6d6f0ae3b3f72e724577fb488cad70730fcde911d26c67af06", 0xc7}, {&(0x7f0000000080)="ab8c9e884900a156cec11360f3763e33e7b6cf622ad74924c15fbfaa6bc2ffecab9dd6dc44b92bb1501d7da8e17badcbb1042f751be7732c8a15e8dd40f13345aa94be6cead011af054ff88b706259433d3decc0cbb525277e6110d17892f63c0eb5c7224b689befc5c5dc", 0x6b}, {&(0x7f0000000340)="0b033cf5be91f4cc7eb1f07034a87c2597143cf4a4566911b957d1f092fa11cdd47ab70fbe753197f80fe08cd93a143d6796c82e41de61fd8df4f30d9617f942ee43ada0ccbbca77fc001efbaaedec1f25c06c3e03e2ca12b3d30f4057bc7d747ca47dd89109434d3217f4037287b4426a224fa859313d4071e2b2c30f5113056ee906a9c7063350e4030fa1fc85cdb32c4134f3cbad2f657e478d44d5a686", 0x9f}], 0x3) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) r4 = openat$incfs(r2, &(0x7f0000000440)='.pending_reads\x00', 0x200000, 0x22) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) write$UHID_GET_REPORT_REPLY(r2, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r5 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x3f}}, 0x10) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r5, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:30 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000540)=ANY=[]) fstatfs(r1, &(0x7f0000000200)=""/131) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) creat(&(0x7f00000002c0)='./file0\x00', 0x4) utimensat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{r2, r3/1000+10000}}, 0x100) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x9}}, 0xa) lremovexattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)=@known='system.advise\x00') r4 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="ff2945d8fd3d121ccf360b14c80a9fc43f8ec9c42240c58cdfdad752848941597431fb6663bd3055c543574c6f419d7ddaf810666315de428bbe17a009261d710aa062cec30a65dc7a10b3ea5a044519cd322e9a1789b7f0461ef0163b9ad3a8a27fc6001c99a2fa637948aa9f7fe3cd1d1cc7a7e42455e3252269f9df095a358316a61993dd469abaa36e9c258339fc77fbb04b3d9533cb8ed52fb7e215ef4aa6c520c604cd4f0f73d6320e5d5294e6e93e347cd9811b064e55be45f23d518061f7f39e208cc86f81000000"], 0xd8) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x0, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x0, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:30 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x0, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x1200a00, &(0x7f00000004c0)="b1a4df0f1d6fb4581fa29edaf420188f091c206f8b438233ee8a07c8ed5ccc4299c0a8fa4c0f47ec45bca27354c02a7bfa2c0929aedb912f0fcc1bf74bc9e441082be9387c3153e6efa69f6aad7b6cc6316800b144a9921d3598f9947301b936b84f697f5871c20f99fadb2c3da4d57d65d246e0d434ea23d2e89474172b7c5e702b799e5e6d51d67e78f120dd81c9742d3ba1fd831a8a3bdeec0a0b5e22196aa4d445f65e016e6e52c248ee2f9e3d5a09de1a0304f7696af397eb4a19181ce8eb6c33701e2483ddf02729e3c3c1132487d658bfd67f7dbd5206f79f2dca63eb53afaff1fe457ade1e73e40cfe2364ff97381938dc355f817e313852a13869f4ad94c1ffee1d84f826061d87b8880e11bb7d6036f5078a03677057a7e34e171aa73178a178290945a217f7b3cd1a0faecb55b965e967f573b6bbcc0cf45048eb527814d27343658768648d75e733d46f8d3a02be3230e2595f4661c30c41d53daa0bc078a6a2686443e7970bb9f07ab3dae54d6a5214ce4429b10e96807a6a85ad0d641b23ae86704c8ce2def860400a261cdf3b6f9b383521797c14e354fa4024abaaf80a21a37863eeecfdead0d5c8c0680846114dfcd5e9648c492e64f29ed0cf9c6154b0aefcd6253829eca1907d82ebb854dc23cd979ea26d738bfa1077ddc0182f1d2865df9a923b2258a5ea2ad1d526c5faa0d1fca9f2218431bf6df9273d38ca614616bf1009dc2e8c46fc16c2730851f42178596a8f0344e997ed54d4a4e4fa17c68ed2070a3b4ddec1d8afd55c65325615562c1c88c0f3c2538590743dd22e858c6268cfe4c03152b9955cbca48253d5ba7dcae81d529abf5b3285146c49202de68901fbfd2056e424d0df5acb7b4bbb28d657ee4baf85678633137482df9a7a99001300cb256357abf564b2b73612f7b4de953d68832ea7dda248360f545b6dc28127dcc1e429904f1b2ca9255deea19c3ed9115d825fffa3078d172ae760b7d35c96d0c591caee04e1587017b070963ed480e46b994f54680000a8fc8916c22df94c108fc34bf4556e3eb37fbd9b49a76343cba49e9a4472108efe16cb84c7680f24bff2e051236e1a76d742403cc1cab10a56fc54f547a92fe783f5e3267678ff69809373c705fdbc752b2d64bb799584e1d8fea9691741ac2b5f854e6377d0f374a00094be1627531dc88e75ae63e50de0990836626abbad43f17ea3717059b2a3d106a50a23ce6dee0375a23e28b7e9f17153a404a4fb3f7810d36cf475c46e796fe5fe7d9f7734ff692ee8c8016f0db7ceccd81ab49f9748ddc789a9555c3c46facadd6b617b4c2f8238cd868c4f1be06d3e84f16b658dc638699d03910a0082c1a8683c507957e17364943a7485188548df5b124458898f65d432d31e1cae200dc74992b09573271d8837f8b1fa631ac68ca4a6a0ef9593ea5d77c8bced20c732b8a2886a193ad0f6065dddd1c43ef9894c3b0fb5160deb4674a395ed6fc6872f8f254097d726b1d23b4ac04a43109d0bed07fec116749a36435c81e4df751e731421020e016c7e00854b480449cc9c67c285c57e84217a5a0158d7f47aa41eea7636c3a866d270b7f9d09893e9b31c32d54b8ea211234193e76fba05b68af1fbada083c57dab15d47505c209cbf18a012fd9c0d12507a83c3b5c6d5563d8dc9b8ffe2ad34afc54ec601a5f64d22725644c659dc69401619bcc59fb6d165116dd8e9569163b44e791b3b5582c6862efcd712dd0c2838dcb6352fe0ed3759818516d42b2bd39bd3c469ce72988fdb2ec8990f5f06f52dda93771e4a5bb332240dbaab634f6bb1b3eb8484c1964fbc63225b417a12c72a751fbde6614b12e5a0fbe1a162913966e7d02f6e43ad3c1f0abf2c9de7aa997d8cfad5c520ced448f202dcf38fb5330552819f4dfa529482341c212ae66741f8f6a94cc0912b1136d8b8f4813a93499faf8bc9b3e19a1a584fb1a3e6b7e6cd84e55669b204610925233b0a59c518b5e864e6ef7a2e94f8a9762f0a416b7c572a90a9a22d87c92fd40928b96eeefe82442cf36b2e9c052624472e4d1f168e6808dedd28fd28bb91675f92c0956886b348304d63d0b81b35607c36a82933a6555b454bafea72b1d9ae1d1d4cbeecd47f682f6f94c1b007ee12c67e52987f65254819a03d0453c86c443adb666fc576bbb8160e105f871f5d7138f7f609b219a838254a8554bdd23657e87da8ef1681b83531ab68f18db9ac9b3a3ee1a2c5a829d26d45234ca035781e2fd733c5b8e0f1cbff558e5550407515e55acd275d8ebe8c33f8590bc9c924a1055f9659b197faeef8671f2aadbd7f00cf6d7cb58c8bf4184416c60302b88682db38a407e035693892190b05b6a8920305e21b7a35e6800f8bd92cb7987c8c5a80b7712a625b931f0aa90e56bdcc55f99a855105c6d73099f9cd18f89de3af7812ee81b949acfb9f145e7a22865746c33a7ce7797f9998f7516eb45f811383d4803700a0658b7106b88c9bfc0b1f60f25e301ad8cc0f24f9fbf3156b9706457bec7f6e4545b414ea96efb1e2faa0faeeaa7f91c03c3eb6c1d1d2c3b00658746eef11e14cab15dde6a14075eae784585544bf9085eb3eba84eb76db59eec5033e2041031ccea943fda6c703a5e52000a6e6b8d682ccae1edc5f6673d8a103729923a0063066c9407277b87d2a92198597c350a1106c78b2700ea65d8065b0932ffcb11eef56b5f2ebf8637519b03ec7913207c69ba279b2e63377de3bd49ae19415d2d5ab3f68fbd2912b17270a2cfeb066b1e25781b44489c85769af81cef33eb29f069b991066e015b380fa82b84bef29c6d549901721d0e57e007e938f7c7a0e44d6bc8235820dde40d8e2f489bcfa039a786c2cccb601b05aba23c53ae37a2b07af09d74e4351fd6711b160cd3a8caa298e84c3adccf3c7bfecdaae9c084a716b050a56ff76e70f35b37bcb4bc8f095874b14e2f0711332412af89cc1327572917e8d6a6aa6e9f480389b51dce7c9ac82e98281f3f15dadd3db676e51744b724d289c09886634ea7fb5fae7fe84ab9119b9c84a1ef175bd0d1d3afcd8616e156c3fb79224ade42b77a7db3a125bdd5eee53d487709860212ba0255f285cf76865cd8f8ca445a24bc1dd3e7c59a0d6fed2fa3339edf52fcaea26d0f03ecdf4100d0b93ef7c933cf0e772075cf0dfc2ac3f4493279d38ab06ebc683b3193b1727ddceb57ef94fc3e9f073b7273592725c19bf0c9312451dd70af8715f70d43db174b4eab7bfebb0babeb177e02b348dff7c0d65d117d83d2f065fbfa510455d7b2be2d831cf3cd14241e26321f55f32c768e48493efe6c855c395348f4f205927a637a0a063f739afde4d26080dc380a58d7a3a8c9f5492dd19fbdf919758c4391ac82f4696de884d6fc6d60859302ecb041d54cab05a3807be2fcc536c6d63bd825654ee27f5a2b622e804cf553db62da5f21af64ca9995af6c196a03d407c2e61fb128dcb7e3f3724c195455fcf33a03ef89a2d9b809508cf9a8e41eee2c486f50360fc7a507ce84804c8ea85c68144b11d780c91fca1e35e67e7c7f010dc73bb1e9b492a79310e8c0576c28aaa7d2efe69613f21ef834bc82c584218c9a85531b4fe758ee4d638ee3202ae5e314aef93cc369f0c49a418145e3336e359e71d0607a6763807fdf0a000d277e10f7f14406582ef6390224f42c085f2ae6f6d879e1576ca15fdc5192eb689be4c4923e3a002547d5675a78469f20260eb77ee9844975188cfe141f9fedb6c9cdc23f2fdc7af9bdd038aa6482a3a756200a3b189d00e645431a7696dbb29eb082c6d02eb08a749455f3b37e3d12b74d601daa0579c236c859d36ae299382237387f6ecff07f47d067f292c13028c3fe6c9ab4180c8daf21283c06b14beca728cc69a83de40bd5d7ffde00d7a058301915be3dbfd7478af9caa8618199b2991fa13cd6fbac78fa61be18a9a5cbea1549f1f7202e2ec7df61574c43b4518f6a8a1f2efb88b4f64eeec7abebfc06fcf22316c424147fb37bbb332494a8b9a2bbb3416b5f62651993f43bee30ee9b733b3fba308374cd305e47c3f278a22c2f9e7bb8520bb7746aab8890f23d4d01190160a8279faa8988aca145917206645d1e22d9579775aa5ba6869610d105859be708ce229af1ed09fd15b19d4ccf83a8d6c6ac1436b1a7e5492544b09fd2d02efb93a387594a912a947ad4c88eb06310723829992703dc1d6affbda2003b8156323bacc4c3007b7273b13e507768bd9d8849916e866459e2da5b26ccbd819348b1deeea2a580634a59b757590a630521a4266cf121181ff9f6efc4643e10eeb31d9df3a8febc1b5ea1d718a10b1bf2e43e6b46e431241db86ab819619dcfadf97388794c776bd9eb061694ce7a707d528b9a807fd87025563345dafd42c98f371f3ab44e329a144fce259bceff19aff3df64e96102725b64445065bc263525f1b4bf0753d75ed3c3520476dd55cc302143e643bcd699e74cf29d65dfd3f44c47918d5878c868d624c30a0716efdc0592c26618c514dff84538f44fb3c141fb8b0700aca2ecb093fe52eb85210232be38cadf5735c6934bb7716ae22f41d450833781efa782ac4c5236f7fed2c2a028372000feebf49f7b753043e9e9b4f90c64f3a954cd86236540281e769d63993432f934a4bed1550ad7dfafab0ad84775bd6e054317f69ada56c24fc22e46d74910ea561d6278ee3b632f08caab623b44b6e3aa05fafd3eb2cdd992f52012e9bb55213ff2218a5b76afc205f595a51ac8ae6ca159be3fb0b7b04ffeed3b7fdc7c2957c0778b49df130eb08c3d4574ca03c43cd15b0a90313a3ac59b9da87078c48f7cd3ee03dc8c5521b219b062da5bc823455aaa68d1554c620825c1f9888c9707fbd2f8b8db2e826918fef838058b4f41d27d969b3ae10f568dfce7c856ee709a06c052b759601b3e86e2ddc26e034cbf997207f7e04f1cf858b7fb5536a5326ea610d8871d2c07f3d9cd07d0d8473b0f3fee2398dce1a9788ae1e035b837a1e22b9fbd8b7f2e09af666ccf167033c730c69cbbfe0963809f52b3783abb3b58e8f5989e6b1bd3b8455680f2c369c72d7c4c961be063f461af146e58411320d9cc0075188b5f57208c29005eb3a1a6316c340fe297a2eda6d0671a5ffff8aa3b6dd4d9927bd65faaada013622b4c6e8f99c64b697548653eb4e6c92e486066af413083b68d2eadeaa4f3dffc3a781e713818f51f656eb6775b3746e72ad257ae54bec6da83d8f7ac80a7e22304c318c4b642af202b53ef7d518eb4ccf851b47e2fa5bbdf990e954654a7f3b80dfd7be0255a0e142a162c246d43fdc0338e9f2590a6dc2fde91c89c0f95bd97cf4982edc3fbff89a1eff351cbfde0e3f7acdddafd7558b33778d527e26dd995a277b4c2a9e3d741aa3b122c5b9aeb8dd1482e6c91101dd28191541af20934e3b90f0bbf8f6ae43f20176725ef3d5452b46392ff4e7c4b810f80de6991f2fd580d3a2085cc7654429fafc49848ab9f9ec24cd6d92aa0d9ceb4ecadc4857f122437476e67aa7218f08815b1b56cfc6241a802967f7af0e3ade16484c86dbdb0749084a51d92ec357eb3cbe07bc437e8ff0f23337493780a17a9c1e56539612ddb8d449b051af518841a3490a7fb7e951ea3e03f411c76b93b6a0a66fe2edecbf940c25478bb0001c56fcb48d00bef449c2986c10b5cf84911f0b66b4ed686f3609a8e57c26beb50450033dd2ba43556b71f5be08ae896f4b765cf725d6ac9f619e883fc1f", &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000014c0)="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") preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x5, 0xff, 0xfa, 0xff, 0x0, 0x7fffffff, 0x50, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x27e5, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}, 0x4000, 0x9, 0x8, 0x9, 0x1f, 0x8, 0x9}, 0x0, 0xf, r0, 0xc) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 4 (fault-call:6 fault-nth:0): perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:30 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 114.337633][ T2991] FAULT_INJECTION: forcing a failure. [ 114.337633][ T2991] name failslab, interval 1, probability 0, space 0, times 1 [ 114.391040][ T2991] CPU: 1 PID: 2991 Comm: syz-executor.4 Not tainted 5.4.101-syzkaller-00440-g55e9d3c6b5f7 #0 [ 114.401215][ T2991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 114.411259][ T2991] Call Trace: [ 114.414629][ T2991] dump_stack+0x1d8/0x24e [ 114.418958][ T2991] ? devkmsg_release+0x11c/0x11c [ 114.423907][ T2991] ? check_preemption_disabled+0x9e/0x330 [ 114.429621][ T2991] ? show_regs_print_info+0x12/0x12 [ 114.434814][ T2991] ? debug_smp_processor_id+0x20/0x20 07:43:30 executing program 2 (fault-call:8 fault-nth:0): perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 114.440177][ T2991] ? __fsnotify_parent+0x310/0x310 [ 114.442112][ T3016] FAULT_INJECTION: forcing a failure. [ 114.442112][ T3016] name failslab, interval 1, probability 0, space 0, times 1 [ 114.445279][ T2991] should_fail+0x6f6/0x860 [ 114.445289][ T2991] ? setup_fault_attr+0x3d0/0x3d0 [ 114.445311][ T2991] ? vfs_write+0x422/0x4e0 [ 114.471659][ T2991] ? getname_flags+0xba/0x640 [ 114.476338][ T2991] should_failslab+0x5/0x20 [ 114.480831][ T2991] kmem_cache_alloc+0x36/0x290 [ 114.485583][ T2991] ? debug_smp_processor_id+0x20/0x20 [ 114.490942][ T2991] getname_flags+0xba/0x640 [ 114.495434][ T2991] __x64_sys_execveat+0xb6/0xe0 [ 114.500287][ T2991] do_syscall_64+0xcb/0x150 [ 114.504782][ T2991] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 114.510657][ T2991] RIP: 0033:0x465ef9 [ 114.514564][ T2991] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 114.534151][ T2991] RSP: 002b:00007f20cd10c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 114.542542][ T2991] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 114.550502][ T2991] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 114.558460][ T2991] RBP: 00007f20cd10c1d0 R08: 0000000000001100 R09: 0000000000000000 [ 114.566418][ T2991] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 114.574376][ T2991] R13: 00007ffda956b6bf R14: 00007f20cd10c300 R15: 0000000000022000 [ 114.582344][ T3016] CPU: 0 PID: 3016 Comm: syz-executor.2 Not tainted 5.4.101-syzkaller-00440-g55e9d3c6b5f7 #0 [ 114.592663][ T3016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 114.602709][ T3016] Call Trace: [ 114.605993][ T3016] dump_stack+0x1d8/0x24e [ 114.610314][ T3016] ? devkmsg_release+0x11c/0x11c [ 114.615247][ T3016] ? show_regs_print_info+0x12/0x12 [ 114.620475][ T3016] ? debug_smp_processor_id+0x20/0x20 [ 114.625845][ T3016] ? __fsnotify_parent+0x310/0x310 [ 114.630957][ T3016] should_fail+0x6f6/0x860 [ 114.635365][ T3016] ? setup_fault_attr+0x3d0/0x3d0 07:43:31 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 114.640382][ T3016] ? vfs_write+0x422/0x4e0 [ 114.644792][ T3016] ? getname_flags+0xba/0x640 [ 114.649480][ T3016] should_failslab+0x5/0x20 [ 114.653994][ T3016] kmem_cache_alloc+0x36/0x290 [ 114.659182][ T3016] ? debug_smp_processor_id+0x20/0x20 [ 114.664543][ T3016] getname_flags+0xba/0x640 [ 114.669037][ T3016] __x64_sys_execveat+0xb6/0xe0 [ 114.673894][ T3016] do_syscall_64+0xcb/0x150 [ 114.678392][ T3016] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 114.684270][ T3016] RIP: 0033:0x465ef9 [ 114.688152][ T3016] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 114.707762][ T3016] RSP: 002b:00007f3896198188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 114.716139][ T3016] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 114.724077][ T3016] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 114.732015][ T3016] RBP: 00007f38961981d0 R08: 0000000000001100 R09: 0000000000000000 07:43:31 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:31 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1102) 07:43:31 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="c289ed05d7f84c8704a2a78b3d38a1b7a5a6d1184777e75ba66b"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) clone(0x8000000, &(0x7f0000000200)="97116c26ad317f330e472e70d8a1d7d6428f05146a61caf91a119425dee3449a0923a0656c9bd84fa02b6f96e3d11f77980838d297f41e0592189563066d9f43f1e509680736125cc8d403f2e372a3d462ce723f9d1923f94e75dba8491f1bb44f10836568", &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000340)="8f8a3e27d85bc4125d652375f7d821322e3f8508f990cec1276fb1b01d42ef87e7b8b61b1d72f5cb04cef858c29a3a04378247d4ff1cc3be10e695cab8991a4b5aacafd5e71695b89635bafb558a46fc74bdbba73ae6580937d6c80e52c3d648b282326a01ea1f6e26598f06edadcc2d30be1710e598ec4110e9688c74b2377f936082b1092c376057c87cd2fcb373e5791e69fe") 07:43:31 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 114.740043][ T3016] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 114.747980][ T3016] R13: 00007fffe9bcfdcf R14: 00007f3896198300 R15: 0000000000022000 07:43:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1102) 07:43:31 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1103) 07:43:31 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="6c12cbdeaec726b3d2d478f772f1d3f10d83c5050000008b876352f6e0cd4b56637bb92022d4b9daf34a0add639743b2b14d73b871f8746fb25f3d17ac952cead504f0ea0a74e2d726771d02d5340d04a788fec438d2e8b8d260a3bfd11b23f566dc6ad0e7163f2d1c87c5b45bbd41f9fffffffffffffffd91e5aa3b1c886f94b075"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1104) 07:43:31 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1103) 07:43:31 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1105) 07:43:31 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1106) 07:43:31 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1104) 07:43:31 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1105) 07:43:31 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:31 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(0x0, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 1: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r0 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r2 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r3}]}}}]}, 0x3c}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000340)={0x5cc, 0x0, 0x300, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8}, {0x144, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x24, 0x4, [{0xffff, 0xff, 0x40, 0xc}, {0x2, 0x1, 0x0, 0x8}, {0x7fff, 0x7c, 0x1, 0x30}, {0x6bce, 0x1, 0x6, 0x80}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}]}}, {{0x8}, {0x208, 0x2, 0x0, 0x1, [{0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x2c, 0x4, [{0x40, 0x40, 0x6e, 0x8}, {0x40, 0x1, 0xa, 0x8001}, {0x4599, 0x2, 0x8, 0xffffffff}, {0x40, 0x7f, 0x43, 0x3}, {0x1f, 0x1, 0x40, 0xa4}]}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x50e}}}, {0x7c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x4c, 0x4, [{0x1f, 0x80, 0x0, 0x3}, {0x9, 0x3f, 0xff, 0x40}, {0x6, 0x4, 0x6, 0x2}, {0x3, 0x3, 0x6, 0xbdd}, {0x6, 0x4, 0x3f}, {0x1f, 0x9, 0xa}, {0x3830, 0x46, 0x6, 0x20}, {0x8, 0x12, 0x0, 0x7bc3}, {0x9, 0x6, 0x40, 0x9}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x208, 0x2, 0x0, 0x1, [{0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x24, 0x4, [{0x9c, 0x0, 0x1, 0x3513}, {0x7, 0x7f, 0x8, 0x800}, {0x101, 0x80, 0x6, 0x4}, {0x2, 0x6, 0x0, 0x3}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8}}, {0x8, 0x6, r3}}}]}}]}, 0x5cc}, 0x1, 0x0, 0x0, 0x408c0}, 0xc1) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r4, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r5 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r5, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1107) 07:43:31 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(0x0, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_INPUT2(r1, &(0x7f0000000200)={0xc, {0xf4, "1ee6d322c364398cc57f3b956adb15d3ab8e1c33ae1ed517d115c16fb35b2fca1bbf080aa53ce8b06f16d590211edb9d28138c5dfcf1e3f54abdfa4c71015c0a232642d810c3f38fafc4fa58483559ffd1629a7bc92ffadaeebe7be04ccb5dddf84c829efbc44420f09ada885e8cda842a07db5e413f36ac6bbf736fda47b4475a857d3bfb947e9480552cc45c752aee4dce6846fcabf7d736ad254f5d473196621cab915ee17ce7ab2ca8273962d07e9b6d1428b046e894eb2b4ede51f92a240b1fdb208a62dbfbbb8b845b900d09d37c6e40719454451229bfba5279917f1825c0b9a980a62cc9a7976554d073f3d1bad19614"}}, 0xfa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="8fa830bc244dcbc28f5daa122e0c24e65cb28224e255a8b99f03844f3016f68aaadef73fc55939e84365302acb7368eca1ad6c5db73c83e45c3b1c0b13bb09a61c714838862102de00e49755bf232f0b84d731ab9ab03628d19e59bd5a68fcee46483f54211544394461bf0ef7bbb3e52f5e8499418e6baaa09d3c8e8641e2a1fadf0d0f7816b970b3f18b5a2511e7398ca2f61dc2fc0203a4cb0e72b42ea3563769580f03b699f961c1fc211eb94d475612d6b0e3ad7892dc8eb492d0befe54af11e6264196df159147a8be"], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(0x0, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1106) 07:43:31 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1108) 07:43:31 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:31 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1109) 07:43:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1107) 07:43:31 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110a) 07:43:31 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) clone(0x42000000, &(0x7f0000000440)="73c17e1961eb74899a32ac442874cf28b5adafdc5522002105bd57985be40fc7485c593e47deb18dd5ff34ebe1e31844b6831df694bc9de678f7ee656a3f4d8b7e", &(0x7f00000000c0), &(0x7f00000004c0), &(0x7f0000000500)="8b40fda701a5d1f7cb532baa3b0c5411a7e0224215f9b22782a3252178bac7581f624553cee92b2e0789") clone(0x88302080, &(0x7f0000000200)="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", &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000340)="35944975d28db198f9ad5ebbeff819a41abc1021903faf22958cf0d3da1da84ed01f8c7c0051d6a621af7ac45284f168da924801facdf3b1e49e4c624a815832e0e8f7f32bda6751f66fd62aef31a3f4f9f1e2337bbbb4d2176298a6ed2eaed06aa523b368c8817926bad64b92945739d9e58812e66cc805e87245a3894972360dcfe433a940ab92167bf0e9ae61b6e8c69d1e4b078eb47222c24070f1e741aaafd050eddf489c752a7b55840aae7f2a296604a3927f7c53b9b8a93e035d851b627872e96afe51") execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110b) 07:43:31 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1108) 07:43:31 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:31 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, 0x0, 0x0, 0x0, 0x1100) 07:43:31 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1109) 07:43:31 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110a) 07:43:31 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110c) 07:43:31 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, 0x0, 0x0, 0x0, 0x1100) 07:43:31 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc76"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:31 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc76"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110b) 07:43:32 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, 0x0, 0x0, 0x0, 0x1100) 07:43:32 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110d) 07:43:32 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) wait4(0xffffffffffffffff, &(0x7f0000000040), 0x40000000, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) fspick(r0, &(0x7f0000000080)='\x00', 0x1) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:32 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc76"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:32 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110c) 07:43:32 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110e) 07:43:32 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 07:43:32 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:32 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, 0x0, 0x0, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:32 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 07:43:32 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1110) 07:43:32 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110d) 07:43:32 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:32 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 07:43:32 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110e) 07:43:32 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:32 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1111) 07:43:32 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x80000000}, 0x440, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0xe00986c0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) clone(0x54044000, &(0x7f0000000100)="9b0233216a9151d4906a9c78bfd31d937c5576040ea20d8cfd12c41c46e78509e2e3f5fa0c6c1814bbdac1d0885ee310c0fb29a58c9b1d885ee4900b8e5dead0b396fef59b67a78a36bccf", &(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)="d3cce0dc3bd77ff8921ea6b1f5fbfb5bd91a142ae672014ab47eb7be1425a583674a5ef3ba1810a5cc3ddaffafed3baccab4b871ffd00d0484c39b39ac2283ddc705acf24a30a931872a75f6e257bb0ea2d6c0da9aff41561c3777a0f0c142de773fe3") clone(0x400, &(0x7f0000000080)="843ab46b757bec49f79967d0b0650cbc0a5136d5e90a43872034c330e8c32510c538e5d64925f5d71ecc8d16314eaed92804fc5a91cd11624ed82223d1e390552d267ae2e2b41a6fb9a201", &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000340)="63268890ed4abfd40ecdd86698a39135922573261acd7c2dd40519f53736aa5e2d7a94eb9d00eb4f8faa1beabb3f26d3646e668352a5dae322b2a046bb6a688ddef0054fc6d2590d7ae670a5851bd5b6dca8387d64c63bb765418cd4bd33c02ab66717bd9450ed98378976a73ca17a11db35682c8e74853ad30f8728f16801dd676dc5d9748fa333cbe6ae99aed0af12704493db11aeeb412c70ddab1a0700c9ec1d4568a92f7ccce3fbfaa7bab37b3da40e41ebe2659b52b171ed05a0292125b74c409ddebb1e76926acf75a09499b5fdb5e44d50daf3") mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f0000000040)={0x6}) r3 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000540)=ANY=[]) fstatfs(r3, &(0x7f0000000200)=""/131) r4 = socket$vsock_stream(0x28, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000540)='/dev/bus/usb/00#/00#\x00', 0x1, 0x200000) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r5, &(0x7f0000000580)={0x10}) write$binfmt_elf32(r4, &(0x7f0000000600)=ANY=[@ANYRESOCT=r0, @ANYRESDEC=r1, @ANYBLOB="89c5b46b6c5dd56263887e6148c66f679ebefbf587373a29746b999f8fd56c7bddbb1e7abacafbcf113bcf4a999c2ed598e647cfc3cf639efbc13411be1ec8d010"], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:32 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="c289ed05d7f84c8704a2a78b3d38a1b7a5a6d1184777e75ba66b"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) clone(0x8000000, &(0x7f0000000200)="97116c26ad317f330e472e70d8a1d7d6428f05146a61caf91a119425dee3449a0923a0656c9bd84fa02b6f96e3d11f77980838d297f41e0592189563066d9f43f1e509680736125cc8d403f2e372a3d462ce723f9d1923f94e75dba8491f1bb44f10836568", &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000340)="8f8a3e27d85bc4125d652375f7d821322e3f8508f990cec1276fb1b01d42ef87e7b8b61b1d72f5cb04cef858c29a3a04378247d4ff1cc3be10e695cab8991a4b5aacafd5e71695b89635bafb558a46fc74bdbba73ae6580937d6c80e52c3d648b282326a01ea1f6e26598f06edadcc2d30be1710e598ec4110e9688c74b2377f936082b1092c376057c87cd2fcb373e5791e69fe") 07:43:32 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:32 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, 0x0, 0x0, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:32 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1110) 07:43:32 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1112) 07:43:32 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1111) 07:43:32 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1123) 07:43:32 executing program 3 (fault-call:7 fault-nth:0): perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:32 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 115.788425][ T22] kauditd_printk_skb: 15865 callbacks suppressed [ 115.788434][ T22] audit: type=1400 audit(1614498212.262:15884): avc: denied { sys_admin } for pid=3337 comm="syz-executor.1" capability=21 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 07:43:32 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1126) 07:43:32 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 115.863832][ T3361] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 115.899500][ T3377] FAULT_INJECTION: forcing a failure. [ 115.899500][ T3377] name failslab, interval 1, probability 0, space 0, times 0 [ 115.974878][ T3377] CPU: 1 PID: 3377 Comm: syz-executor.3 Not tainted 5.4.101-syzkaller-00440-g55e9d3c6b5f7 #0 [ 115.985051][ T3377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 115.995097][ T3377] Call Trace: [ 115.998384][ T3377] dump_stack+0x1d8/0x24e [ 116.002709][ T3377] ? devkmsg_release+0x11c/0x11c [ 116.007639][ T3377] ? check_preemption_disabled+0x9e/0x330 [ 116.013350][ T3377] ? show_regs_print_info+0x12/0x12 [ 116.018533][ T3377] ? debug_smp_processor_id+0x20/0x20 [ 116.023897][ T3377] ? __fsnotify_parent+0x310/0x310 [ 116.029005][ T3377] should_fail+0x6f6/0x860 [ 116.033411][ T3377] ? setup_fault_attr+0x3d0/0x3d0 [ 116.038430][ T3377] ? vfs_write+0x422/0x4e0 [ 116.042835][ T3377] ? getname_flags+0xba/0x640 [ 116.047503][ T3377] should_failslab+0x5/0x20 [ 116.051995][ T3377] kmem_cache_alloc+0x36/0x290 [ 116.056749][ T3377] ? debug_smp_processor_id+0x20/0x20 [ 116.062114][ T3377] getname_flags+0xba/0x640 [ 116.066609][ T3377] __x64_sys_execveat+0xb6/0xe0 [ 116.071475][ T3377] do_syscall_64+0xcb/0x150 [ 116.075971][ T3377] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 116.081876][ T3377] RIP: 0033:0x465ef9 [ 116.085741][ T3377] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 116.105311][ T3377] RSP: 002b:00007f56f514a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 116.113686][ T3377] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 07:43:32 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x112f) 07:43:32 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1112) 07:43:32 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, 0x0, 0x0, 0x0, 0x1100) 07:43:32 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, 0x0, 0x0, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) [ 116.121636][ T3377] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 116.129575][ T3377] RBP: 00007f56f514a1d0 R08: 0000000000001100 R09: 0000000000000000 [ 116.137522][ T3377] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 116.145459][ T3377] R13: 00007ffc0dc60aff R14: 00007f56f514a300 R15: 0000000000022000 07:43:32 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:32 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa88}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x80, 0x8, 0x2, 0x3, 0x0, 0x3, 0x8800, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x200, 0x0, @perf_config_ext={0x6, 0x5}, 0x300, 0x8001, 0x9, 0x3, 0x8000, 0x1f, 0x1}, 0xffffffffffffffff, 0x3, r0, 0xb) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x8000, 0x9) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f00002eb000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000240)="c4817c2b6f80410f78d9c48171efad00000080420f01d1450fc739b9860400000f32b91e0800000f3265660fc6cdc366ba2000b034eec4a2858c044e", 0x3c}], 0x1, 0x6e, &(0x7f00000002c0)=[@efer={0x2, 0x1000}, @dstype0={0x6, 0xb}], 0x2) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x400000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r3, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r4 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0xd8) open(&(0x7f0000000040)='./file0\x00', 0x682200, 0x0) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:32 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, 0x0, 0x0, 0x0, 0x1100) 07:43:32 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1123) 07:43:32 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1148) [ 116.171571][ T383] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:43:32 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1126) 07:43:32 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(0x0, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:32 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x114c) 07:43:32 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1102) 07:43:32 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, 0x0, 0x0, 0x0, 0x1100) 07:43:32 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) write$binfmt_elf32(r2, &(0x7f0000000400)=ANY=[], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) wait4(0x0, &(0x7f0000000040), 0x1, &(0x7f0000000340)) 07:43:32 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1103) 07:43:32 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 07:43:32 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1168) 07:43:32 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1104) 07:43:32 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x112f) 07:43:32 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x116c) 07:43:32 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 07:43:32 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(0x0, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:32 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x80000000, 0x2040) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x4c) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r2, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r3 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="fa24244758c5cf525926484f1af4b8743942b68d156d34f216d338230447c0d8502553b109aa83d85e72b6782e2008f26277fd279d60e115f9b7e7ed1ea5142dabb363ab043191f2a8a9c0e8a6cd29a81c927034c1b2f7b1970f1011683cf3c901322eb35115dc55b52ec47f5a367e8fb559c3dd54249ed4e02f805a388f7ae2d2e491e398ea37b0e2bfdd3848d12250e6d5cb29b826d0f0391546addd23e58d9f76bc0e07e72167eb95ee5f056305dc62"], 0xd8) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:32 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1148) 07:43:32 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 07:43:32 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1105) 07:43:32 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1174) 07:43:33 executing program 0 (fault-call:10 fault-nth:0): perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:33 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x114c) 07:43:33 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1106) 07:43:33 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x117a) 07:43:33 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(0x0, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:33 executing program 1: perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x0, 0xff, 0x0, 0x0, 0x0, 0x3c43, 0x2402f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10240, 0x0, 0xfffffffe, 0x0, 0xfffffffffffffffe}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r3 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)=@bridge_delvlan={0x6c, 0x71, 0x1, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0x10, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_TUNNEL_INFO={0xc, 0x4, 0x0, 0x1, @BRIDGE_VLANDB_TINFO_ID={0x8, 0x1, 0x8000}}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_STATE={0x5}}, @BRIDGE_VLANDB_ENTRY={0x10, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_TUNNEL_INFO={0xc, 0x4, 0x0, 0x1, @BRIDGE_VLANDB_TINFO_CMD={0x8, 0x2, 0x13}}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_RANGE={0x6, 0x2, 0xd}}, @BRIDGE_VLANDB_ENTRY={0x10, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_TUNNEL_INFO={0xc, 0x4, 0x0, 0x1, @BRIDGE_VLANDB_TINFO_ID={0x8, 0x1, 0x401}}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_RANGE={0x6, 0x2, 0xa}}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4040000}, 0x400c085) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r5 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r5, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:33 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1107) 07:43:33 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1168) [ 116.569752][ T3521] FAULT_INJECTION: forcing a failure. [ 116.569752][ T3521] name failslab, interval 1, probability 0, space 0, times 0 07:43:33 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x11ef) [ 116.637701][ T3521] CPU: 1 PID: 3521 Comm: syz-executor.0 Not tainted 5.4.101-syzkaller-00440-g55e9d3c6b5f7 #0 [ 116.647905][ T3521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 116.658001][ T3521] Call Trace: [ 116.661302][ T3521] dump_stack+0x1d8/0x24e [ 116.665730][ T3521] ? devkmsg_release+0x11c/0x11c [ 116.670666][ T3521] ? check_preemption_disabled+0x9e/0x330 [ 116.676387][ T3521] ? show_regs_print_info+0x12/0x12 [ 116.681576][ T3521] ? debug_smp_processor_id+0x20/0x20 [ 116.686936][ T3521] ? __fsnotify_parent+0x310/0x310 [ 116.692036][ T3521] should_fail+0x6f6/0x860 [ 116.696458][ T3521] ? setup_fault_attr+0x3d0/0x3d0 [ 116.701476][ T3521] ? vfs_write+0x422/0x4e0 [ 116.705881][ T3521] ? getname_flags+0xba/0x640 [ 116.710546][ T3521] should_failslab+0x5/0x20 [ 116.715039][ T3521] kmem_cache_alloc+0x36/0x290 [ 116.719816][ T3521] ? debug_smp_processor_id+0x20/0x20 [ 116.725210][ T3521] getname_flags+0xba/0x640 [ 116.729744][ T3521] __x64_sys_execveat+0xb6/0xe0 07:43:33 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1108) [ 116.734587][ T3521] do_syscall_64+0xcb/0x150 [ 116.739079][ T3521] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 116.744964][ T3521] RIP: 0033:0x465ef9 [ 116.748840][ T3521] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 116.768461][ T3521] RSP: 002b:00007f6baed2e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 116.776838][ T3521] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 07:43:33 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="3b0c09b8db2ad49cc26c1e0c9bfc9fe85f0e0408ac529fb171bc105cbc49b1fb747bd2a9b36d034d93a34b7b7062d21f6c67"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:33 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x116c) 07:43:33 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:33 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x979}, 0x0, 0x400000, 0x7, 0x0, 0x7dd}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x80, 0x40, 0xff, 0x1, 0x0, 0x200, 0x1b01, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8000, 0x0, @perf_config_ext={0x3, 0x6f}, 0x1340, 0x1c20000000000000, 0x8, 0x0, 0x1, 0xcd7, 0x80}, 0x0, 0x2, r0, 0x0) clone(0x2000000023141200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) r3 = syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000200)='./file0\x00', 0x9, 0x4, &(0x7f00000014c0)=[{&(0x7f0000000340)="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", 0x1000, 0x3}, {&(0x7f0000000240)="71cbf49d09c15d8335ec77a5e3f81e6383dbc747c4c488967f6b5ff8079aecb5206798c241ae6e0cd2212791402aac0c90e18af20808b391e958e703c5637e57a27dccc083f6736fa71196d0e824022640095ef7f790925fb0a878313d7eeec02ea141ce60095b54887719d39e8604ec", 0x70, 0x9}, {&(0x7f0000001340)="6e69ca3b8b470267fce55777bf07fad8455c784fde9550525a56bfb567c7073238c577935c671cd77e5b8c7cc5ce5c24f208107051a030842cec523fe17da2db6da951aaaf3ebd78b52f00d09d4399132e73506ff63b6c7f8acadb07662d34a861c487ec5de54d11e0f8d0b9cfd6d45e1efc036832dc9797f8b4e6a4e8e6a95f0238dd2dcf748d844929cacd958cb985084ec62e4f", 0x95, 0x6}, {&(0x7f0000001400)="4886fdfe5fc0ef547d6cbf609467f5dd9db454cd45791014d32e7b20344b5b9908d60f1fba3acb235874fabf79edb0be43a71e28d20c61d02cf6df37ebd2c08a27f2bf3b0d0a14e7f4f8e10638bff5b2b651e719e6e46d19673e90bea600a75692475a9738165a446162e40c12728edd0f2f0015f2427b8fb949e77d99a06f01022bfe2ab8c68de2e7c445c666443a32494e40b2892d", 0x96, 0x7fff}], 0x802, &(0x7f0000001540)={[{@acl='acl'}, {@grpjquota={'grpjquota', 0x3d, '\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8'}}, {@fastboot='fastboot'}, {@resgid={'resgid'}}, {@noquota='noquota'}, {@alloc_mode_def='alloc_mode=default'}, {@prjquota={'prjquota'}}], [{@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@smackfsroot={'smackfsroot', 0x3d, '\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@hash='hash'}, {@appraise='appraise'}, {@uid_eq={'uid'}}, {@smackfsdef={'smackfsdef', 0x3d, '#'}}]}) openat(r3, &(0x7f00000002c0)='./file0\x00', 0x28002, 0x108) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:33 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x40, 0x4, 0x6, 0x9, 0x0, 0x1ff, 0x5b210, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x1, 0x7fff}, 0x1000, 0x0, 0x4dbb0, 0x0, 0xffff, 0x8, 0x1}, r2, 0x4, r0, 0x9) [ 116.784832][ T3521] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 116.792770][ T3521] RBP: 00007f6baed2e1d0 R08: 0000000000001100 R09: 0000000000000000 [ 116.800717][ T3521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 116.808654][ T3521] R13: 00007ffcf3e3e30f R14: 00007f6baed2e300 R15: 0000000000022000 07:43:33 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1109) 07:43:33 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1174) 07:43:33 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1102) 07:43:33 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110a) 07:43:33 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x117a) [ 116.894304][ T3586] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x6f8cc308) 07:43:33 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1103) 07:43:33 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x11ef) 07:43:33 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:33 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110b) 07:43:33 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1104) [ 116.950666][ T3586] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 117.014717][ T3586] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 117.045263][ T3586] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock [ 117.108486][ T3626] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x6f8cc308) [ 117.117055][ T3626] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 117.125290][ T3626] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 117.133881][ T3626] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock 07:43:33 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, &(0x7f0000000340)={0x0, 0xef}) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r2 = memfd_create(&(0x7f0000000040)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xdd\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10\x80\x00\x00\x00\x00\x00\x00\x00\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\xa3\xa8V\x9a4\xbb\xdaY\xd8\xef\xeb\x8d\xe1O\xa9', 0x6) clone(0x8200000, &(0x7f0000000180)="6669593deb848c0ef19cf4fc80e517e392fe4a297e541dc83f1f166c2f84f99e6ed2ca5c5ecb0cc66b0670a33229d9e0a06331a5a6d4622b60bae2fe5e73f2ec45535fb29e215dc07d7f692b4c09daa96220cf6b2234debc76e3b36ea7ddff34556697f158f6eb820e70ec0ed62e3b38156abd745ae3f7c093aa1cce4f6d064241bd9cdde9a68b7bd68f3a1e8e3f326900f23971cb1016ae883e0b78bf9201de499d5932382933a2c98e49709a090d0cea904242c4", &(0x7f00000000c0), &(0x7f0000000240), &(0x7f0000000280)="4167f9418451251a5d3afbf6aac63c48419c8a284d00b2db4c5737fdf24bc991591138350f203c09a1882879fca38c8adf4d10e492e8af03614eff268a4daaab") execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:33 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110c) 07:43:33 executing program 1: perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24032, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x10204}, 0x0, 0x3, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="1cc2edb568e74eea33a1290e000028d6a556077f8fb105fc886cc735f6eb3c7b4f2a23b8960adf35249fe2884022b9f529134e75d2db61ae76661f44effc87789964feece6d9ca40c4a7526e810e"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:33 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1105) 07:43:33 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:33 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:33 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110d) 07:43:33 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1106) 07:43:33 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) mmap(&(0x7f000051c000/0x4000)=nil, 0x4000, 0x300000c, 0x10, r2, 0xeeb42000) fork() ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000800)={0x0, 0x0}) fcntl$setown(r0, 0x8, r3) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) preadv(r1, &(0x7f0000000780)=[{&(0x7f00000000c0)=""/59, 0x3b}, {&(0x7f0000000200)=""/133, 0x85}, {&(0x7f00000002c0)=""/120, 0x78}, {&(0x7f0000000340)=""/215, 0xd7}, {&(0x7f0000000440)=""/183, 0xb7}, {&(0x7f0000000500)=""/227, 0xe3}, {&(0x7f0000000600)=""/102, 0x66}, {&(0x7f0000000680)=""/216, 0xd8}], 0x8, 0xfffffffa, 0x9) r4 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) wait4(0xffffffffffffffff, &(0x7f0000000040), 0x2, &(0x7f0000000880)) 07:43:33 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="2c6f07ea2c8c36b1ea000000009dde6e70738db7d05796080c1224d333fd2fdcb672739fba43bbee67df2ac2a41460b9f500703f8670e8ecef83716afe55eade712c618ba8ff4589c40b0469df581c5b77c2a86d9d77137bfdc32e4009fc268c7378ab00db5530"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:33 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1107) 07:43:33 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110e) 07:43:33 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000040)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\xaby\xe7\xb1\x81\xba\xe515\x04\a\x00\x94\a\xdb\xfb\x17L\xbf\xcf\x91:\xa7\xa1A\xa7`p\xa15}\x96`\x7fK\x87\xdf\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffO\xfb\x91\x92\xa8\xc2\xcb\xae', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:33 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x7, 0x20000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:33 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1108) 07:43:33 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x0, 0x0}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:33 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1110) 07:43:33 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:33 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:33 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1109) 07:43:33 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1111) 07:43:33 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='freezer.self_freezing\x00', 0x0, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:33 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000069f000/0x18000)=nil, &(0x7f0000000340)=[@text16={0x10, &(0x7f00000002c0)="3e2e0f01c23e64673e0f79b2b6fce3eef4360f01c80f00541cbaf80c66b84867dc8966efbafc0cedb821018ee836360f72d734660fd57400aa", 0x39}], 0x1, 0xa, &(0x7f0000000380)=[@efer={0x2, 0x1}, @vmwrite={0x8, 0x0, 0xe, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7}], 0x2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x1f, 0x2d, 0xff, 0xf8, 0x0, 0x8, 0x40, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1e, 0x0, @perf_bp={&(0x7f00000003c0)}, 0x80080, 0x18f90d72, 0x400, 0x8, 0xfffffffffffffff9, 0x8, 0xffff}, r0, 0xb, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) wait4(0x0, &(0x7f0000000040), 0x40000000, &(0x7f0000000200)) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000300)={0xa, {0x8}}, 0xa) newfstatat(0xffffffffffffff9c, &(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) fchown(0xffffffffffffffff, 0x0, r2) r3 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) r4 = syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x2, 0x101341) ioctl$FS_IOC_GETVERSION(r4, 0x80087601, &(0x7f00000000c0)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="19c83bc0078023bb236fdc986b65e4a1bcefce81b7cf368d44025985981a36c462ea13bdedfacc7d87fbb1829c31a294fdb01d4a114c7f7911e053fbe4a351ebe9e08d75c9c8b1d20c2f07220d7a37dfd846e7ce9c35e17b2f10b6f8ba565dae316dd079c69e7dc7273040805e2efe7166"], 0xd8) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:33 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110a) 07:43:33 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x1, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x5e, 0x8000, 0x1) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1112) 07:43:34 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000040)='./file0\x00', 0xee01, r2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x110, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r3 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r4, r4) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x19040, &(0x7f0000000380)={[{@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0xe7bf}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0xffffffffffffff76}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x190}}, {@mode={'mode', 0x3d, 0xed3}}], [{@uid_eq={'uid', 0x3d, r4}}, {@euid_lt={'euid<', r1}}, {@dont_appraise='dont_appraise'}]}) 07:43:34 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110b) 07:43:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1123) 07:43:34 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:34 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1126) 07:43:34 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1000, 0x0) getsockopt$IP_SET_OP_GET_BYNAME(r0, 0x1, 0x53, &(0x7f0000000080)={0x6, 0x7, 'syz0\x00'}, &(0x7f00000000c0)=0x28) readahead(0xffffffffffffffff, 0x8, 0x7fffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8008, 0x4, 0x3}}, 0xa) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sysvipc/shm\x00', 0x0, 0x0) sendmsg$NFNL_MSG_CTHELPER_GET(r2, &(0x7f00000002c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000280)={&(0x7f0000000340)={0x134, 0x1, 0x9, 0x201, 0x0, 0x0, {0x2, 0x0, 0x9}, [@NFCTH_TUPLE={0x5c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2={0xfc, 0x2, [], 0x1}}, {0x14, 0x4, @local}}}]}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private0={0xfc, 0x0, [], 0x1}}, {0x14, 0x4, @dev={0xfe, 0x80, [], 0x15}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}, @NFCTH_TUPLE={0x78, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private=0xa010102}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @private2={0xfc, 0x2, [], 0x1}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @empty}}}]}, @NFCTH_QUEUE_NUM={0x8}]}, 0x134}, 0x1, 0x0, 0x0, 0x48010}, 0x800) r3 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) r4 = openat(r1, &(0x7f0000000480)='./file0\x00', 0x400000, 0x8) write(r4, &(0x7f00000004c0)="3c11a919e8cbf20dc94b25d362e43312f2e84f924985fd56f521fe2c09b88d58073ec3ddbb4009a57b2cc6f1d59e8d15b3c17e8f21e744fbb80fcf546f51d8dc63b1fbcfab0bc128b08209ee71ea06aa74f8ebe60092806f1e40c350fad719466eeaa5f3acc65de5b239dc49d3f622b69ebc9a8ae93847a8ce405562d0b672a3c69725036876a8c4f6d48a451aa337ff82db51c409063d1ad82c25dd6c24118a5bf918cedee4045dd7c9614a469cb9d8eb2a51920813ac838356f4259b27c0519bb512d0ff", 0xc5) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:34 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000480)='attr\x00') ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x20) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x10000, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@map=r1, r0, 0xd}, 0x10) preadv(r0, &(0x7f0000000280), 0x0, 0x0, 0xfffffffc) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="51cb9e65521fab0d3e18877d1aa2ffffabc1fbd57452645bbc5e6124d3b226b116e30017279e9d9921b28ed997ec26a3409526573ed3e17ee1292d2937a604160c5172806c891af116ddf134104a452bb46694f0a465ed733439b066b5ee84f095ae5a7eb52f6d019f38c30bc3961c53f75bb063ae33d3d591511b901d4eadfb4c035f368dc0889c10399915ba4df685c8bebbd0a0e9d625b127735e1bf2ac54e8fb72ca6081caacdaa0d964e14bfcee963cce275ef6c37f58dada4eb69075045fd304b9010000009ff1e78341f5dedd38ab32b348a09a472f969af7c6979acbd883f4ae442eb1508e2c86266bf5d83a80060973caff3f2f561c7a0eea8f877f68cba7a781c7aafce148e34f6c0f77cc2f00af04194a00e88ddd873a8fb8b91a4536d45ae2e36e0602d8eb91e367525dfaf202191f1a4aec3b09a4631d1addf11647ac0eb2eecd493b44bef20e8f1e021afdf04f200000000000"], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r3}, 0x8) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x442100, 0x0) perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x9, 0x7, 0x40, 0x8c, 0x0, 0x5, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000240), 0x8}, 0x640, 0x3, 0x3, 0x2, 0x92d, 0x4}, 0xffffffffffffffff, 0x4, r4, 0x1) 07:43:34 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110c) 07:43:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x112f) 07:43:34 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x9, 0x6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:34 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000200)=""/203, 0xcb}, {&(0x7f0000000040)=""/191, 0xbf}, {&(0x7f0000000340)=""/118, 0x76}, {&(0x7f00000003c0)=""/116, 0x74}, {&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/229, 0xe5}], 0x6, 0xe0f1, 0x80000001) 07:43:34 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000540)=ANY=[]) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x18080, 0xa2) sendmsg$IPCTNL_MSG_CT_GET_STATS(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x5, 0x1, 0x801, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40845}, 0x1) fstatfs(r2, &(0x7f0000000200)=""/131) pwrite64(r2, &(0x7f0000000040)="b2bac4d976ee12022ed773868d5f75ff33e0d4f08b910b22d43baa8bedb21cc27c361e32d56410774a390247decc9b9362b60e60374f73611a0483524fdc055f6b2ffd57fc1e4d3886cded8da0c48a5fd89fa1e5ca55e8456b7e4895894a121568888c", 0x63, 0x401) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:34 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:34 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfff, 0x400, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x80000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1148) 07:43:34 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x20, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x80000, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:34 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110d) 07:43:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x114c) 07:43:34 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r0, r1) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) process_vm_writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/92, 0x5c}, {&(0x7f0000000280)=""/75, 0x4b}, {&(0x7f0000000340)=""/149, 0x95}], 0x3, &(0x7f00000008c0)=[{&(0x7f0000000400)=""/234, 0xea}, {&(0x7f0000000500)=""/20, 0x14}, {&(0x7f0000000540)=""/151, 0x97}, {&(0x7f0000000600)=""/101, 0x65}, {&(0x7f0000000680)=""/85, 0x55}, {&(0x7f0000000700)=""/172, 0xac}, {&(0x7f00000007c0)=""/209, 0xd1}], 0x7, 0x0) write$UHID_GET_REPORT_REPLY(r2, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r4 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) r5 = openat$cgroup_ro(r2, &(0x7f0000000080)='memory.swap.current\x00', 0x0, 0x0) mmap(&(0x7f00007e7000/0x2000)=nil, 0x2000, 0xd, 0x10, r5, 0x52fbe000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000040)) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:34 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) clone(0x82000800, &(0x7f0000000040)="3a5946de56233959d94dc35c3ff81e00bba8e138d3a37789008c01f282c9e26deb31b67f135f1bac830374818ead0163", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)="4219cb4825940850e78a5f0ebd882feecb7993456595060c8211ad8e57438099a3ba561d2666d6c8045b442933abedcc09528ce368c54097b328c1777a994a55f067422ef0f19a9b2919d45921a42051fae96a903295dab8f97019d821a2a1fe4c16ed5a3e0ace1d51a13ab5250fbd0267dc63050a28bf87ae05ab3aa1436160fca6052635adf60ca22e") write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1168) 07:43:34 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110e) 07:43:34 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) clone(0x102000, &(0x7f0000000040)="4fc855ca068853e9e957309960d69eed799f233068bbd53888897a442a02f92eada13ab27c", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002b00)={0xffffffffffffffff, &(0x7f0000001ac0)="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", &(0x7f0000002ac0)=""/45, 0x4}, 0x20) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r3}]}}}]}, 0x3c}}, 0x0) sendmsg$inet(r0, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000001340)="2f0adfc030bd0d4e2986ce8eeeecc1dc19edfe34f501710d6f7359e9ecbe2fc5f6044b26a960b2a505f0233fa34ca89d0cda8fc55c233b9c9e09142fc3da7e3cd6a25cf5f380513289d650f921bef5a7bb51a4f35b6e70731ad3d4388a60a12bc8476d5930221f5b5ab42a80d45b859498f1e21909ed73b31df228746d6fd0fdd1b5daf383c833e05230b4c87a565c8afd1adde1c334e9703ba53ce9d45924bf8b3374fdabf997778f9d7d43e0b088ae40b244e3709d0bb60ddde83b29b8b9f338459b0ab3", 0xc5}, {&(0x7f0000000280)="9e61ba32b99fc6cecee5c328c46f71e3c85d3a97999822e9deb72114a2882a56aaf71367de34ea63352cda39f685a29b56e2", 0x32}, {&(0x7f0000001440)="7fbc467a5215c3baee2acb24e7178cf589b85ed9d911f88f08f5d5bb527981047e44776d7f2dde5d7e321d6a3845169728e83d049c650abdfd645609ddc152bb50f8a0c57dc9cbed6b0850d96a49544a772dbf80dc10fdff40a3d909a4c7a025f9d5c15dfce6f71ef2aa8581dfbac11ccd19f8697acdec6e51e49aea1854e50624121d81cfd6c430a8516292321951bf9efa166acc50f863aa", 0x99}, {&(0x7f0000001500)="d737fd94c6eb750fa519408d0bc72746275d82007d1dfe9c78c6f477d3394b2539ed113976b111dc055204ce8881748faf0083c0a0053709ee87de6a5b3856b3dff17e6bbabe8d5a531ad1d9038f1536299532fb9a751a94fbd773bab9d96df59046d206ce8269fad70ecf1303caba369ac7b69a0ac94f566de932fd3d77236a0207", 0x82}, {&(0x7f00000015c0)="a539a4c00f7df753138efad6337c1f19f97fe1139d29adfb2fd730cdc17df41f5885c7179a9d966f22b55ddbf47558871c2f53c706a6a5fd312410cb0510edfd3d5dca609c40bb0d8fcd5fd733b58de6d6eeae5b30dbf890ff19f8dbc8a77f4c920ffcb4a0764c21f7ea8b0e58f732afc11ff8109532e76b45f06ca661dd2c3e", 0x80}, {&(0x7f0000001640)="c6c14378b5dc2dbad3d058bb8a6da7c7b39874affd7ee1fa1a60e7e2a2a9e6450ad1f717972e93004fbac26dbe0a4902bf1f5cf1413c9e66b8246df2919ed6ece3e20ba69d3b8b8668a76cd5c744bba73734de05c274cabb72136a8b2059004e09f9836c5130690b73d427828f7dc31c3fba7f6d1fbad8971fd6f16e54fe0295f1789c8e356f16842435c039f94f741f68e8d4ed6836dbec356dcd154103d837022840b2d852d9cf44359fb1df838db2a1519123380a799840", 0xb9}, {&(0x7f0000001700)="15ce9782688bc194d0c9560c2757fa9aa55b1636db592b48b0e24a20d9583734d25e436edc398e5a2bad6a523ef260cf678a97ab62bf5e74b17700c74d6013482a4f879cc1db829ef0bc1e5ab6faac5459fd5bacc9c4c1841c8ee5d28173f652904bcaa3adaab767598300c1b4db7db5fc9a126013f64049fb3119ac5435c0e67fdb8b19d984500542a4ced07f0ae40ceca809a23ddb46b54b81be62bd653c33c13d5461c078c2eacdeabaf218f514e7a91ef67815fe7056a69d55a2f8850d9d34a059c96e438907ee93498898a29792738b07f11dd0e2f7c78b23f676a3a07bf886a9c73a39c2d77c7e6c05816769688a5b97d3", 0xf4}, {&(0x7f0000001800)="f98b45476a15173b6e34487d64c1716495edf341145ff7bf98be6424046b9b88fe0cf3335913c18a7b40df00d64659507f5b3fdd21535577512e5140570b05e6898902de3813bbe67f27ed51ae46ff55cd9666d4dcbbc2b99b645aa24ea267817fcf15cce95fc6e8a991b7c8bc490a7fce14e9edbd063700dd287ffa26d489a34867737bdb8a5c5bc9470b97c70189436140e5bd27044c676fa89ed49cae0c6bbb4a321074325d3622e7bd61d0648154fb92783b91331620c6a1680408fa3528c068afe4d45200d8b6908f64004a0d150784399da55dbaf2cba87ea319e9cb35cb44", 0xe2}, {&(0x7f00000002c0)="ac06", 0x2}], 0xa, &(0x7f00000019c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @multicast1}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}], 0xb0}, 0x0) r4 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="fe173ce62959463a6bc3a7322dd5f714bc827fe224cb17d3f9621c76a0ed8b917347f25933343af3ec43b2f59c79aba9544ed8611e894b373c836eabd3aee88cb6"], 0xd8) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:34 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:34 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x116c) 07:43:34 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1110) 07:43:34 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) clone(0x4043200, &(0x7f0000000040)="09f689f830e2515e3da11ff63e8d800ca43e40b8212c49c6bb6333ce6ec0123d1fde937fd6d25a2e04f3ab1a2ef3e44117d733c75469953ba5d100c520d1a84535ba8aabf7288ca2587d069244b12b11f9b4d879badf413a21f97d1e272b01b6dfdf70b31b0a7a46227efa2d47167af0a80f474da1a09d4953443adc34a915aa3080", &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="215213065aaca2eaf24a8f52437f1bbe086fc4") r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:34 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x20, 0x0, 0xe8, 0x3, 0x0, 0x1, 0x710, 0x7, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0xe}, 0x8, 0x4, 0x5, 0x5, 0x0, 0x7ff, 0x8}, 0xffffffffffffffff, 0x8, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) preadv(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000200)=""/206, 0xce}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/180, 0xb4}, {&(0x7f0000001400)=""/4096, 0x1000}, {&(0x7f0000002400)=""/51, 0x33}, {&(0x7f0000002440)=""/58, 0x3a}, {&(0x7f0000002480)=""/36, 0x24}], 0x7, 0x3, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1174) 07:43:34 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1111) 07:43:34 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="b9b0de7069b5f3e773020000006a4fa2278a59249774453178b4c9db76404d60019ad5efd3b8ef3121d1406a2a205b08f8487d564c009f577b1f5314280541a13f00"/78], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:34 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1112) 07:43:34 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:34 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x0, &(0x7f00000027c0)='./file0\x00', &(0x7f0000002800)='bpf\x00', 0x2880000, &(0x7f0000002840)={[{@mode={'mode', 0x3d, 0xd82a}}, {@mode={'mode', 0x3d, 0xc43f}}, {@mode={'mode', 0x3d, 0xb0c8}}], [{@subj_type={'subj_type', 0x3d, '\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8'}}]}) fstatfs(r1, &(0x7f0000000200)=""/131) writev(r1, &(0x7f0000002740)=[{&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000000c0)="d5", 0x1}, {&(0x7f00000013c0)="5e3217456f0a49628020422aef3693e095b56579a768383720072a1405291206c3a279349cadf86d60b7571fac1361c2ad1a9379d64f819c56e68faf6bd7326b7465c9c4f5cea0b180452ad2fab9861be608c3d4cfca9c4efa3e634d99c86d0f9f333fddbfaf6c76d02ddf5e94aee34c7963fda266e3aa71a85793edf2e32a0607c79f702047a2250bc6881f33a3e5726cc91cffb220ecb9224f14863503c93c556cdbfa5395c029885198d58d6c5ce2acec0144a36d4689757c0d36210bb872d78fc4d60bf1c742709c321640ff85fc30aee0f9c10c", 0xd6}, {&(0x7f00000014c0)="c11fe80bb0a5c22c76159429bb6ea2952574de58b2d65d2c5ce6c5c178736db3b87ef0cf2bafc8026b9c8e0529d418c451910b259d0780a10594d9557a5019820716fef80b364058eadb8523521636d6d655c87c265e601ac8296760df5f17bcd32678af0c0a00641ad13d78ad4598a35188956ef22e33308ba82ddf346d0ca49819621ce371d704fbd57e733ed50f96c991002d3d6fee1b6ddd2fdbc6fded3bba697822885d29199e5b4fa5eb49577ccff7cedd363240d4889980069f68c78bba3cbf82d9a35e328dd6040b757b934cab6f2d4be039e5aac90164d7f36a459df0fbc18dc78215c7", 0xe8}, {&(0x7f00000015c0)="bf6af303de3e896787892209ae47a0b9ba2903e051109a070cf5b4fcd6a5e98499c6a9ae41fba21f02f44df6ae113e07b0d605ace281ffdbb6bfd39eab2f7985fd981f26a37e06effb08c1be57098285be9966bfcd24c78fbb8e19836cfa753c53325ac06a7cc975f8a7ea5e386998fec5d5141a763361b449288beec5452f3453edc6bc7ef8229b5d9a24037af909014c47f68b1e67525e87f0c88c6648d018372997ee2de6c20998afc4078c69757ce6ac75f516c1de972a4043339095a17adcd3345ea592da158c834a0b44ac17319e2687a03d0b7f63a60fa1a7a69d4c8e4ea651e80cb6", 0xe6}, {&(0x7f00000016c0)="09f48a67f562a6cea8c476d1aff808f5b9efd919eaa6c013436a3b737c4f8f707114fc79c58704ca6adc9b5a712c7c4bb18f29d14eb8c0005c4e0fa7da30cdaaf16820c5f3a59ca5857fcbfd5681d822cc30a2638a0c919c70ff8dfe7b568d4712a2808bad741cf2442295a2b1b528fab47b994e1be08d7685", 0x79}, {&(0x7f0000001740)="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", 0x1000}], 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) clone(0x28100000, &(0x7f0000000200)="18b476b43a2b271a5292f6ce771eb4c8e9bcdec36d26412d5884208f3a2e63626df157b8f583bfc04c0c9ba6f63acb8b5d5899c656d635993e0f310640e0ec9a5f41ce05b3dd52e08d3c04a4477875acb9709582b304d193afc476ab843e755565379911f31176ce0ed3a604e73680a876b9be27b56455888c614a084600ec7b119592b32ab8dc83bb49bef1563a28c62ef58a5dcbd0663124544441bb65ebc868154a5d5f76c280b891c3f25a4aa92645476f799fe425cfcdfcab5818f154856f7a93329a3154bba3dcdb1e98cbd2", &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000300)="bfe5ae82ca698639f5d7d97f78b908a6755b206f7cb19cb405e61cda7330b6c965762408bc49196de66b7ea00608500d2c2a9c814a6bdd29720b29dec0a252e3e9022a5bcb1afb0dd94e5e0ea435e2773218e3c81ad32907d291c7de2ff4135eb3603179b46556329d484b5bbae335ed47114305fb05cf3c31bf961196e2327a19010c9dc8382bae4033ca65ee5718d09492c38436a1f0cbc55b8fb54f8676fc8230274fa9ad9ed0393f63a78fda8666ea379a") r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r2, &(0x7f0000002940)='./file0\x00', 0x0, 0x0, 0x1100) 07:43:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x117a) 07:43:34 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:34 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:34 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1126) 07:43:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x11ef) 07:43:34 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0xa, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:34 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x112f) 07:43:34 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000002800)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f6275732c77d567e8066972352e2f66696c65312c7065726469723d900c7af0fab82cedab8c07f2b9042e2f6669c3b85ca773f4ca4a6945ca362308f270ec25cb77d7d3e30b96cdad11be63bd76b000000200de45e2dd71aa7bbca174d7a49affffd668bd92f871f2fe785c9612926b353b62a2db35e5b2c0351aea0f570951a1f1650bb7b14289ae882d3502d4b574dea44f39ff9f746ab2cb800000000000000000000000a6ec0203b929c7a3de44c3161c8c7b11428cdad5ac49c1c4d6f1b6f458702610b71e8595b31e1eaeef5152c8dc4ee93f17af15268a32b2bb2aaae02f967ab909288d14a890aaa097fe2e190b7326bf7fae53a30bfec80c06effba1ae0e753acf4bc42fa44633c82590e10f3072af89403f3b"]) chdir(&(0x7f0000000440)='./bus\x00') creat(&(0x7f0000000480)='\x00', 0x0) r2 = creat(&(0x7f00000007c0)='./file0\x00', 0x0) fstat(r2, &(0x7f00000003c0)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000300)={0xa, {0x8}}, 0xa) vmsplice(r0, &(0x7f00000006c0)=[{&(0x7f0000000200)="afbed197601b0b0ad998cdca2f6fa0d0e5435d51396e6113428b73b1c688", 0x1e}, {&(0x7f0000000340)="4854171491c136c96809b45959d746afe27c64b03520ff4983b2fa0afc7ea1a46dcadd9c855dea7c6f1dc760a2436e6dc4d0f43097b805e842cbe6d71990c079f4f32ae314b8f5b9a2d1245e29259de6c89b62d9556171ee209234a6d381d40a983d4d3484e44bb0fe0d474612", 0x6d}, {&(0x7f00000000c0)="954c03f6c6e19b1a9933eb96a1", 0xd}, {&(0x7f0000000540)="2f875b5cb0d72d4766c563e64ed3c48da03a373db2e2315dbaebed830fbdff930a8e1219147cf02aa2b9ef024fc0b826e5be99baef839db4d370ad5dd9484ffc08055e455e154a296d3766a16a3801345ce1741eac2f709f9202d087e996a9", 0x5f}, {&(0x7f0000002a40)="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", 0x1f6}, {&(0x7f0000000200)}, {&(0x7f0000000800)="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", 0x1000}, {&(0x7f00000002c0)="1c00d0b6c43843", 0x7}, {&(0x7f0000001800)="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", 0x1000}, {&(0x7f0000000680)="855460734936c94598bd", 0xa}], 0xa, 0x2) r3 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000002c40)=ANY=[@ANYBLOB="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"/368], 0xd8) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/key-users\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000000c0)={0x92f1, 0x1, 0x3f}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r3 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f0000170000/0x18000)=nil, &(0x7f0000000540)=[@text32={0x20, &(0x7f0000000500)="8fc978c795b7000000d9e80f06c4c168582882f8dd0f79fe0f01cffcb8010000000f01c10f2260", 0x27}], 0x1, 0x0, &(0x7f0000000580), 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000200)="5019353b3d31e63401490070e8ab1fbc8720f32790d30f7fee06dd6ed0270bcbbfe51c207eff4fc33603ec80fff276dfe04f7c87bcd315ef356cefebcebbc18dc83ecc7cfea987a3b29df5d7abf33e77442035bf7cd1913966d5eb7d4878023821c6af42d01e616b4b4e9d1960ae393e17eb0c7e4f917b8ed147216ac37e1d37219ad34b47e0d21ad8bf16adec72fa9ae0cf4eb8a9e9f566cffb9b95c8e03d8500b6ccfd7185a3745a2740fdaa8b106c759a03e2cfc47d16f20c0ca5993bbbf80d7d3bcf7d2f33893325", 0xca}, {&(0x7f0000000340)="eb215dc3c6c89075a9b19391e2d119496c2f384abfbfa8b9b85a2ab78ba3928691208480ffcbd7732263f89fc453653888589385e5bd1e8a6068e1fdfb6dd8cba4359b2022b5d9e6be3cd91057e10993f6ea9bed434eed9cf116c8b0b494951bec8390a70009028d3072b737b486b4d2a870b070f98d495e958c7eb73ed330adfd8437516365fd291ecf4dd7a4c7df481443f8d03988213372c77365f0d778c5db4d27699109506ab0ca099ce5675eb4c5cb75928335d95fdbb764d69c65877ef38abee3b5ef0ce039", 0xc9}, {&(0x7f0000000440)="3e37c975ffee9b2e4b0428561d53e6b67bfc3ea15b160cb8b7ca77fd6ea84ab92a416b6ed4a8dada1ce98737b46ec8af83f7d75a66e43b249ab60c6f798b8e8daa5597e3f263399b675e670bdc812a644cd9c133192f19a1b9346d0e0e68d9c901b610af49298fe4d1ae53265ff651d6b45668e30b1abc4a830d50c7d8c5067f6e1556ac18aade984f3b01d6919320639a3702a14f66fb64c3f8a5849ecc35b90544b4f88f76e7da06e403859073b0c83a", 0xb1}], 0x3) 07:43:34 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:34 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) wait4(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 118.196020][ T3979] overlayfs: unrecognized mount option "wÕgèir5./file1" or missing value [ 118.203046][ T3981] overlayfs: unrecognized mount option "wÕgèir5./file1" or missing value 07:43:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) mmap(&(0x7f000055f000/0x1000)=nil, 0x1000, 0x1000004, 0x80010, r1, 0x76e13000) 07:43:34 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1148) 07:43:34 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x95) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:34 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) r2 = socket$packet(0x11, 0x1, 0x300) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:34 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(0xffffffffffffffff, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:34 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x114c) 07:43:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0xffffffffffffff7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) clone(0x1000000, &(0x7f0000000200)="36b165a65fae5ca502d500ebf973459bfef9bc7cedc12528226bab2aa83280f0b11c9f2cef1198f98db1dfef8622967c33f987da92b26dcc5dc62a1fca5bf9cf970dffce8c82fe96d20bf1fe195fc4352eb4d7ee03c8ff74fbff3664c1518163124b9ab53ba839748451ddae92b88fa20dfdee44d19e0057afa6b441aaf3e1e3f5a403d52f002bb8843d4aaec77b220be311c723850484198bdc3b04e01d7d0ac71cf3db349504cb478d1dfc1313cd9ee389042464bca904a04fc7eacd9fc6a3d03da63c79cfcd048179982c71ac45bd93b801ab92f184f3617123115681715781f69340776fe8fba82abdb8175b2ac0eafc84908aab17a9dc45", &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000340)="21ea919327dcb2d2108040193402d05d7b813ce11eb2d7cdbe01a1e3d3d3aad85e78cd3cd13524b3ca70c42b8e70f1baa7783772f5813894e8c47a2e052a237c0c5d99dc7bc8663a18e528e701b5f2f9a08f0b012fd30c0867131fb5cad611e7328dc99b41b5cc9373f418ee20016e4a983765573d229842e101c138db4721e65d39cb7438781616dc2763fad5b24db144d100c7016bf4ec9994") write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:34 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(0xffffffffffffffff, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:34 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1168) 07:43:35 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x116c) 07:43:35 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x24, 0x0, 0x3, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) clone(0x80, &(0x7f0000000200)="3ff60795b3948432007e14116527dad484a15dcc78bc40b71511346587aa2c68e771a8675e780131470c4c554646b6427b0231799e24a1bf686b55e842dc95e5a327f5d3511a65609c9333fe20e183afb2dd93684ff62ada190f482c4610f5f347b51586e6b26371402c84887cc5118ecf961f64cc249adaf2badcb8eb8520f5624e7c9ce36014cefd4c4b377a6e7a795e2ac983e48cae26ac2081f7e5caae9983c51f9d440235a8db40fd3ee671e3ded541d5748466c6a085325bf6e79558cb0bb440e1d9b5fb82a6e765523213196b37edc5873c0d829f063d7d241a8d21dfa3e6640000", &(0x7f00000000c0), &(0x7f0000000080), &(0x7f0000000340)="1a68d260fd5c16bf545b890d24f82b914b4b331dee076b8c6a55d27c8f27d381e93af6243cef1408d93bd480093b079da3b0b4e3e9ed3803c7032cbac7d376e8c2a8cb9dcd2af6fff203f23033e85946a53db0f6c2a574e3a39d7d71a98ece26deb061ab1677a5831541158cefafa9f97ac22a6c42e2ba7a44f796b20adfe5b1539f0dd4399623693d6967b2a8bf85c3e880767c2b007c77a31ff7ffeacdd9f20483af2be9c6c1e9cd339f16d989a46c3182e8ec09fe34a796dd13ad683e997f0fd3c779e9c864c5b2bcbb9a4713") write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) ptrace$setregs(0xd, 0x0, 0x1, &(0x7f0000000440)="dbe6cfd3d5e7eae2ab95968e496304c05efa9365fc891e6d7ca83afbc73afb943a85efdf1ebd01b21fbde3224c3135c3f04491566dad18c9d599bef02dbe0ae0e90541c6831746bcb4d66a1ff11917da") execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) write$P9_RREADLINK(r0, &(0x7f0000000040)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) 07:43:35 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) fdatasync(r0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) openat(r1, &(0x7f0000000040)='./file0\x00', 0x210400, 0x100) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:35 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(0xffffffffffffffff, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:35 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1174) 07:43:35 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x117a) 07:43:35 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:35 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, 0x0, 0x0, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:35 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x181180, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r2, 0x40189429, &(0x7f00000003c0)={0x0, 0x400, 0x8}) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x20, 0x40, 0x1, 0x81, 0x0, 0x0, 0x10003, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x1, 0xfff}, 0x4, 0x8, 0x3c15, 0x0, 0x1, 0x401, 0x9}, r0, 0xe, r1, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x4002, 0x20) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x4000010, 0xffffffffffffffff, 0x0) preadv(r3, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r3, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r4 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYRESHEX=r2, @ANYRES64, @ANYRESHEX], 0xd8) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:35 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x11d8) 07:43:35 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write(r0, &(0x7f0000000040)="2be3f5e924071912329d8b6cb5a72ec4", 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:35 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, 0x0, 0x0, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:35 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x11ef) 07:43:35 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) ptrace$cont(0x7, 0xffffffffffffffff, 0x20, 0xffffffffffffffce) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:35 executing program 1: r0 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000340)={0x0, 0x7f, 0x5}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:35 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xd800) 07:43:35 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) ftruncate(r1, 0xa5b) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:35 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, 0x0, 0x0, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:35 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x7f, 0x3, 0x1, 0xb8, 0x0, 0x2, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x5, 0x4}, 0xd054, 0xfffffffffffffffb, 0x2, 0x1, 0x5, 0x101, 0x40}, 0xffffffffffffffff, 0xd, r0, 0x8) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:35 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) clone(0x34040000, &(0x7f0000000040)="c8ce3468cf2c57c8515d3822005ed54a1cc6", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)="b7bc69b30b38fcaf0a254ed73949591cb40c929b3541258edd29cf8637c5616d016f02a0be7ff32653cb6bd1c3de82f7256c2dcb0d37fcd5917033c2e4dcb6b036b6105971d50b2dfef3abc0ea5bc781c386514cf53660ff4eb27c87d98e41c9fc5616efa20efec792620c81a5d56ef3ec39b072b7fa362b3d61876914973940055b32c7d6356ecbc32a229e47722057d9f591f5979175a84fa39df5aaaf69b26a706d289829f8b0f6b8a6148886ca6a412d85b75f12df02ed20ccc93d3ffdcb9281847734d49f2d044bd62e1194c0fcca7ef9ad930b5e14eafe03c9619d05c5a0d65539b2ebe8ea0705") mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = syz_open_dev$vcsu(&(0x7f0000000340)='/dev/vcsu#\x00', 0x40, 0x480000) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x800) 07:43:35 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) r2 = accept$unix(r0, &(0x7f0000000200), &(0x7f0000000280)=0x6e) sendfile(r1, r2, &(0x7f00000002c0)=0x20, 0x21) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:35 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x610, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:35 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540), 0x0, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:35 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540), 0x0, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:35 executing program 3: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='rpm_return_int\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:35 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000340)={0x6, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "37e6c507739688"}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000001340)={{r2, 0x81a, 0xffffffffffff0001, 0x1a, 0x7, 0x4, 0x8001, 0x6, 0x7, 0x10, 0x5, 0x8, 0x80, 0x8, 0x40}}) 07:43:35 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2400, 0x71) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:35 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540), 0x0, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:35 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000200)=""/131) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x12) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f00000000c0)={0x1, 0x3, 0x4, 0x100, r1}) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x9, 0x1, 0x6, 0x66, 0x0, 0x4, 0x22418, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x400000d0, 0x2, @perf_bp={&(0x7f0000000340), 0xc}, 0x5221, 0x7, 0x80000000, 0x0, 0xfd, 0x6, 0x7ff}, 0x0, 0x2, r0, 0x2) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="edf7bd7c2e02007c71194f289ecb82079e99db25550000000000001909d599"], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:35 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r0, &(0x7f0000000600)=[{&(0x7f0000000440)=""/187, 0xbb}, {&(0x7f0000000500)=""/59, 0x3b}, {&(0x7f0000000540)=""/28, 0x1c}, {&(0x7f0000000580)=""/128, 0x80}], 0x4, 0x3, 0x7) clone(0x80288000, &(0x7f0000000200)="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", &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="746026b0b212eb21c8dbed29a42acd3679fd14718b9804e2faf3f7e3bfab6eca3a5917323ce1b3f3c3b1f80d25c630b39bac32c6c234c8fa93c9d4202241abe59b") preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r2, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r3 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) r4 = signalfd(r1, &(0x7f0000000640)={[0xac9f]}, 0x8) pwritev(r4, &(0x7f00000019c0)=[{&(0x7f0000000680)="2821e7071a7180", 0x7}, {&(0x7f00000006c0)="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", 0x1000}, {&(0x7f00000016c0)="0ec9d993edb05d43147d6ccc2f2bccb4429906c1e0214bf1cf5a299d190254f8535564d5f9dcfe94edd50b7fb8aef9382abdf51e757a5b4906bca2e5d53718f26881b9044fb984cd5b37059a425bbef79375a5a16d03cea2c64824a8c3ebe10fd9801eb844b406b503c357308fc9bc1140087c2606e9", 0x76}, {&(0x7f0000001740)="b63f981f48e488c860b054255090c5f25124cf39b4b7df8b2c3e7ff2391534dd7f85d3a5e1f72da9d1e1829dabbcd6845bb74c7874927d4a2e8ae312d4a6bcd12f5042cbfaaf7cbe778692e4ee7764bfb80c2a7b6dc72a3b966a677b0ea113ee192bfb851dcecf56a49fb05095c85a8c8bc00b4f7eb44d09c7d887956856ec1940fbe0e2be1d03", 0x87}, {&(0x7f0000001800)="d9af4ac19076bbb94f9a00bd47ccdd4ce3b9ba54ced2d4265acc8cd389b6177931c4030da972bd5a6637e28292513dd48a0fa0cb2f405e89472f36074da22b854ed44a8e65b8c0ace0690721f2bac0a93197887bf4a2451bbb03e9f734bd0d", 0x5f}, {&(0x7f0000001880)="9ee04e853a2cadedbbfcacd9772d1a12c4d6", 0x12}, {&(0x7f00000018c0)="7dc98e4f9f6880ac9017da3180356b9086aff37e47893b5b3cc45cba7e5fbfac05792846a3e6a0e2355f38ec32d00c01f7fe4844a64e315c2f01a7e4de82fbe467bd2d67ead11b6d166d1b98f57003d35c91cdb2d313f8ab8179247ab0251912021f2b9c5a6ac8ed2947a20f9a56c922cbc349dc7177c7073315ecfc95d885a7934d24173eb16fdbba1825734a23c8eed33a68159e908391e5ac50483dcf58d3079235c5e2c5e304317d51c4f33792a5f72eb4cc5da2ad", 0xb7}, {&(0x7f0000001980)="b77068a29b5c743850ea3ff8e22a9571da", 0x11}], 0x8, 0x80000001, 0x0) write$binfmt_elf32(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:35 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{0x0}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:35 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/kvm\x00', 0x80000, 0x0) dup(r0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x24000, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0)={[0x7]}, 0x8) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)={{r3, 0x0, 0x0, 0x0, 0x2, 0x8, 0x0, 0x200000, 0x1}, 0x8, [0x0]}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f0000000200)={r3, 0x4}) 07:43:35 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) accept4$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14, 0x800) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x10, &(0x7f0000000380)={&(0x7f0000000340)=""/47, 0x2f, 0x0}}, 0x10) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vcsu\x00', 0x101800, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1b, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000040000000000000004000000850000003f00000047a80000f0ffffff621b1804ffffffff18000000050000000000000005000000950000000000000007255fd32126d326aed64b9dbf3d7949550d276550ffbe520b6afa2fbd5e0d4fa919f76bebd1cfc134fa02c071537a2748d44c1aff07de71a031c12aa678f781c58a2f8b0000c720b249f1861f09b215cc2b9d355b9aada1543600000100fbbac664ddea4292e6ec"], &(0x7f0000000080)='GPL\x00', 0x4, 0x10, &(0x7f00000000c0)=""/16, 0x41000, 0x16, [], r1, 0xc, r0, 0x8, &(0x7f0000000280)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x4, 0x4f1f8a52, 0x8}, 0x10, r2, r3}, 0x78) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r4 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:35 executing program 0: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r2, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r3 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="7f7ff9458100002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85c83576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:35 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x1100) 07:43:35 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{0x0}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:36 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) open(&(0x7f0000000200)='./file0\x00', 0x301302, 0x181) r3 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x1, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x70, 0x4, 0xff, 0x4, 0x5, 0x0, 0x3f, 0x43042, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x1, @perf_bp={&(0x7f0000000040), 0x8}, 0xc021, 0x1, 0x3, 0x9, 0xc3, 0x0, 0x8001}, r4, 0xffffffffffffffff, r0, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='net/netstat\x00') preadv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000240)=""/132, 0x84}], 0x1, 0x80000001, 0x9) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24822, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000340)={"80ce501573b5ad9ae1455215f787e9792bd997941c56e3427d27436c7cdab23a9b73a800a6c9b53fa2763de13cd4e27ce596066d1c81b84478d64ff571a4400a1b48a989d1c1a8d21a333df40bc2b79588e0f9bfcceccb2f1b5318319e3418915d070924ca9bc7acfc8864fd82fffdef1e5c4d6bac8cf3d7e250bda17c4b839cb4474c4628a680caf52e5c67c3b6043849bfbbb22ada3129640735e2ad221a643b8df7bc55f8d3e872541df1eb6ea8934a0d08770d5137c39e63986aded6bb58555148f5948e5e08026c03150e2832d4058dd6c85bc7c24099224e0d666d80d52af5abc49f50209b33489eeee06408fd2b70b427f613f8d62a1fb1804a32cb1bfb44057696414355133346de9776e7d62df7fc6a27388b9b5498c31ca4462652fad86aaf6e4dd719ad0eadf25ffa213c76f6af6d5d604714ff4f7cb70a8278c81cc8cc65a508b4885079cd4e3eb54b8e3b7878aa30b59f2bcdff9afb2173ac88b0f6f667da64e23c33efb0aafe51082b8a09888349444becc60e8a84281f5a67b80b85950ebc2649a1041b80ea59bcfa63bb7a6232243c58509dc1a98cdbf5b5a7247ad3d79e2455f153da704ac3c1aae8cd72a30c9d35a341465baf27b0506d764e3e85c8d1456e55445bc61faa345e05eb2959ad05f701a45ee03b65f9682bb7302247a39813897a9becb20ac7b5fa6d0d9b59d6f74cb8ffd6990cd92ce238b8bfc34c09ebde88483a31fc681ad005e9bf1490c7f5d1f2fdc20b8c8ed92a37d76b44236139914f601acff9942ccef17770a37041a4c85e0bbc840ad96a6bd1476b563aea3ee822aac496c48bf1bfaf24624c70c8ab97aea2822388386809cb5d8c8deb60dd508070201492820bedd762488a12bdbea65f63765b2c85b08ba49e33092f4cfe83ee6304f0c6590a9b40febf78a217c6009f1ff0fa8d252b63d7430d454c23dbf6568b8e91cd6b43717d96a1e346c0a3ce40a80a8479a463551eb1f1f13d3ed44a322ba643deaf24a06fc9c4baeb11bca927bf13e5d812a346e9a5523251002ecfec2f00c6a4f26a32b1eb72e34d21d4c27891b07e9ad5242bf18764c9f051a9e0bf0c1cc8847a82c02d45c036d09e40af7dece0a50fd22373255731b5a91f26fdd35f01d81ab4c1ae30c4ad34a0eb247a2b71ae2835661402f8e7233543c0623ffca7a9aa656ee2679641fc934d4de31413415c45e1f7570dbaf429d9e2b20c00aae2e860bbfe203e37c25af7b524ec79a519343cb9d9a95de7afccf8f96094d7546d1169ba26a6ec019b4ea0668f9413823de0bbfa48d1d3b809ca251daacc4f5118ed3e384270ba9f4fbbb77501c306c4552689b34018cb21748c08beaba2e0013058b582caad8edf273a753a818ac11140b62b6cfd0a8c587a4f5ac9a738054a2bdb93d032cf9ea9a520b465753c862089f1aa5280e720d9"}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) mmap(&(0x7f00007ae000/0x2000)=nil, 0x2000, 0x0, 0x2010, r0, 0x1b7c1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='syscall\x00') preadv(r3, &(0x7f0000000240)=[{&(0x7f0000000100)=""/54, 0x36}], 0x1, 0x0, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={{r0}, 0xe33, 0x80, 0x5}) write$binfmt_elf32(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca657d1829ae697139777dd64e81a1ac4bc7671b8357b87f10e765ce60b70b00bf55f8b7de188da0000000000000000"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x40}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x4002, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4, 0x8010, r1, 0x6) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x81) 07:43:36 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x2010, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffff1c0004000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{0x0}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:36 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="0aa06cb6dc3d768e8a7c4279b522c26876ad0f9d786daaa42187eaedb061f0949f66191be705ede8853cc23eb174226d21a06e1812f10d94cdde9cdaa4aab5fb1739de7689ea335aa6da91a6e5ea1d5b14eadd33c5b263373ce3d483ea6cf6edc5cfacb4c9b52d"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x9, 0x81, 0x23, 0x0, 0x0, 0x2, 0x1000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_config_ext={0x2, 0x5}, 0xa4, 0xb0f, 0xb1fa, 0x5, 0x29c59293, 0xfcd, 0x6}, r1, 0xe, r0, 0x8) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000000000}, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) socket(0x11, 0x6, 0x9) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395af185cbd058c1db23a9030001007ea85ca6576b9a99ff01000000000000e697139777dd64e81a1ac4bc7671b8d9bfe82dd1e5a79ad558533d399d29f3e210f21b43259178346df1888ba578b6be46d4a447ec0880f71b553bedc9417af2d33c7577a04c3b182c"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000040)={[{0xff, 0x8000, 0x4b, 0x2, 0x5, 0x0, 0x1, 0x12, 0x0, 0x7, 0x80, 0x1, 0xffffffff}, {0x0, 0x200, 0x9, 0x40, 0x3, 0x0, 0x3f, 0x1, 0x3, 0x7f, 0x2, 0x7, 0x5}, {0xfc9f, 0x3, 0x6, 0x1, 0x4, 0x9, 0x79, 0x5, 0x8, 0x1f, 0x40, 0x7, 0x1}], 0x101}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1a\x1a\x96t\x7f\xf2\x83\x93\x00\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDqm\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM%z\xe5_\xe0%\xf1^\xa5\x8a\x1e\x99_\xc1\x82\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1', 0x4) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="bb147bc21433bf183e0746e5b711366250c36b875b36ede5c25113e53aec17a506704f50e55429aa727771b2bce792fe6269bb86f236ddc0dd3c8986b896e8e0776797a41bc4df374d06dafc93f147197204752e24379a9afb99839986ccfcfa91fee02faa12ffef915775cea53c620efaf46d6de6a37c121bbd2b8488a666a6f59bc23c99278532cec6e8b722e507e235181cc20435adb522aff2302fbb03c114c34fd13ee27f876d805beb6515"], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) 07:43:36 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x1000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0, 0x10000) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:36 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x1010, r0, 0x3fab2000) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x402002, 0x0) preadv(r1, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/125, 0x7d}, {&(0x7f0000000340)=""/162, 0xa2}], 0x2, 0x1, 0xffffffff) preadv(0xffffffffffffffff, &(0x7f0000000200), 0x100000000000024b, 0x0, 0x81) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x7f, 0x5, 0x0, 0x2, 0x0, 0x7, 0x30102, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000280), 0x2}, 0x44000, 0xe63c, 0x409, 0x0, 0x5, 0x6, 0xd3}, 0x0, 0x10, r0, 0xe) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x18080, &(0x7f0000000040)="f57c06a4bbfec779d5abe27638b44028f01c9f1fe0d710560ef3d9846f34a419108923d604ccff", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)="c4a71333b6da39c765b79af3076010905da525a7b4d7cc765715e7d0242a1b7c586a232402539c6dcf110887c094eeb29f903b6f8b19ab24d412ce3c1682acd84e50ce791d95a409533c04ec44ad12f8991179a9bce7b0bd52c95b7e09f98a74c1f5ac7a12e831a03bd70d") preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xf760}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) r3 = fcntl$dupfd(r0, 0x406, r2) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000040)="7d74869ecf4fa4603c14c0da32e21ab0993b7458758a54a1dbce4bab6f6a28a681e8e5f5956e7cb749b3bc0a5699696f77d0b237cdf5a5c818948059718f88c60fa702107c370a045e00cee8d02ebe8da329dd6ba8bd69624ceaf622632a2af182d2ad84f23e83bd3d8b75b72cb227093b12db237cb7c962421a7cc0ea53724f8e46a6", 0x83}, {&(0x7f0000000200)="0303a4da003b299e800b6ec8a8c2325d1338aead17bfe6e05f7f0de2a839c33c8d06dc188b5de4a8499d82a5db7594f56da5753773", 0x35}, {&(0x7f0000000340)="73c23e4c10fa565a4d16165599260aff2177b8bb5fc3e35686b4e9991fbba274759694030be9dfb90fbb5cadcb7f380d0219f32e534eff8a14c32f328d574a918dae5be573218fc0f8d1506bf3668416994f2b28c511d0705b0523be17ee77b21f18e14bdc32d224c805fdbe0d91109bdb3f4f82b4eff372abe0596f00cb5c45a80c12aa0020c99cfc85750cff0b618d95e383ed4b86faf5ff413a59f4336466a44fe8e852e066bd591420547444b0e3a00c18b2a21550312463fabfb058656c69155315e4c18974ab4190", 0xcb}, {&(0x7f0000000440)="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", 0x1000}], 0x4, 0x0, 0xa79d) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:36 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x4, 0xff, 0x0, 0x0, 0x3c43, 0x25173, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fff, 0x4000000000}, 0x401, 0x0, 0xfffffd08, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000001340)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) fsopen(&(0x7f00000000c0)='aufs\x00', 0x0) fallocate(r0, 0x1, 0x367, 0x2) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r3 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) clone(0x2d100080, &(0x7f0000000200)="985f3ba20adf2efb065de056bc21b71d4d07bb5ec5ee155546f77612bf6720b34080478a9ed139b890a66631bf578b269cf043dc78cf29de5debd307ea9f8c81a18e1610f60e872cd9cca8db9ef43257970260f1c3702aed3b54d296a65674e201faaffad9bb1bab81597cf94926c073c9780d9d98cb4357a2848da8677b8fb83fdb1aa6e1903948fd920b8744cd031a53551ad146086e18fbb35537946c878d57cae390f5f9b8014d357542486eef854992ca0994bd20bb46e8995c9787490d97", &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000340)="aa9ef20491cbf2d8ca0d3d2d932cb7566072bca74d2fafbb7801396fda6f729b70d222bdd200918909c651b6b8e83755a9f41abcee3a7a91845561db04d034da24dbf8857914ded33762dca256c13356741b5500620e1d43252350089ebd2a60961590efcff8ed3b03387b40421bfe0630f286e8d5797d21bcc1c7990cf38b7e6bbf465ba36a2934b567e0c2b7cc111bc105c5fb66ba73beb5166f5e0ccae98ea0b3b92f589c4b499ac572bfe4afab53f4d4c29e116ebb5e708702ed456e1cdc7be949c9de30c2d42323d2d72b998d8e64d799adaa73f5536d2e1c30a1558fa8744ec123beed79236b5d1ed599b295923b1d249e0304d948adb5861e39d7e996209349af7446aecb2ffd10835dd57aeaa833198a6721c7e8ceb6ccb12fa49e16be94ae897fdbab2bc6b5e0cc2939dcf24b90dcd73edabec9e7e664c325944f8a917e06a235653ee04cc8354a61db7e0c3da80c8095b7380737baac0942f37c830afe587b9680c88398b7405a600a063b8408516f4c44e27103a1d65408137a1125c10d81c59f0f89172dbb01a939e00b16ad6b4ea60c9cdef64dc71b64c2ac4017c863a55123db2adc021d2abcd2b8ffe4e7aa2f4218036bfdda46ba498380e50c847b28d0d0c646850d7746cabe3d45bad8d51dd1c8cf4f55c4b1e9e722a814ba3ea44288486828ab04307c2264c6ba95afa293ba6443ee056c57ced0726db03dbc76a1984d2a9abc762e94bbd2a32dedc217d757dcc23d836ed92a293e65b433a6c52511abeecb02210ce68275ac0d2fb94804c1134832b91e7fc35d1e3394f399c6511a8649ae4e31782eccba526f45d7669ffecced87ede35c8c4b09b929aa30ad9e4b8790031574e83f35fa49dcf5c7a5a5aa453b4085d1261bc9d2a5770ea6c62370decdeb3855578f3d3f6823063f7dfcbb403194de7908c0d1de1404e60e32e46384e0d441d2ef1edd9718205b6cc9c5b36f66014d2d0bbce8e7324e1574d77928305307a4791a88d54889b1d7926d51a24ef182074ca68339553ca80501347887fafd84b7358669b5f83d69197f390afcfb061d3e1b633c460bf3676d4fdffa2f05adddb4782c3c7e7bc66185005b871053ac9b21bf647302d8ae1e17378cf6071ab0e561554605c4b6cdca8bcd536f9907ff5bf91e51ad3c121e215bf0dd06f13a37b48fd8f41975f2b06eb11837ca55f3cff664d450b206b65072038f86dae6ad971c84fd66b961c6f3625cc4ba14bf13705ebae12517e4d4110871a4512481567102f6659e5054a5c5f008ea7e05fe2fa7b5d19c187d248ccafaa10ce2b262f9207d5d14c3699c4feb52adf38ec79c9b8c188eeddb3111591a231fb4e75f457bf3feb88d876bc6ee22b75767e423bd0aa157a87bce239b505aae72e41332f1b2d709b0c34d50bd1a615256704fda8523d9f4d17e51eb2c623955327c258b2dd726e3205b451f0efe0bd74e177f21133371aab8fa3376bffe61d2e600282b58d69931a898062e32401d69f6ec545dbed76906aa133f2d276cca87082f0fdcb8012fab60299b731203ccb4d0fd84976a34293d21e7a6c58be2a2ee2b28bacf17808d8b6c92680c84a9e43e351a66deb6a9eb1b8b5e2890f8c67a270822e9ccbfadde727fc7c8a88d90e140c1b9a81238ca892a207628fb6e883ab88ace3c988c47ddf5e74acbe53776fc10d108ace17f4f810e61b9a00f73567995825a91da4f2c9fa18c762d112c5b3610ebc45992a480bc78d0dfa9513e6b66305e1d8a54028bf6daacff0a0b63047360eef0e1cf722246b682b8841f2ed11f48618855b25f65f71ac6c09c2e82458394c1fb42d8fb93d973102c172d07414d214c2590a852663a1624d38208bf49b038655351cb794a59a17e4f1c40836ee9236a2b65dc58bc5c203c307df52665d6e40742390bd8bf1f6dc6c366e17f056a3a03b0f8b49d1812ddb54d242540514427ee86b0ca23c31caf4bd0056be433c8fb75c1106ef8678e4c70d164ed46c59106f45b9282d3bf09d791d17404baabb13d319ec0994d707e1902158f9eed1ff6ecd1c198928c5b3e41ca37fcd29b88e9ff9f58e3938e166c060cc87301d666b8d5593d6f51edbf8b5a82b28e11e63d63a7b43ce9dae81582b2dd6f2ffef7045c6e1bdd238984a940c876c47d2e982dfe156dd0a343c993a0a3ca4622206f1a24cd3bef50f24eeb7d8608a2f2ae889d69a248a85a8754ee9292019798de1c29f9a48830494eb3f3bde391f2f61e5819f8221d7985427d51530964cc9fd95ae5c13f94ba05ea0031b02e9f8d1ba9575fba08612ccd66e3fea23fc90be375e08bddb85283d20ce80fc3cbd7e8c4e323a2242a2817b208a1bcf5c44751ff37ab029cbee8ca1ecf46616d3960b0ff8c5a114d993503384a84026a69012d458708875f823ab6362ace76ad9f00a9da1b80900e22148b91b0131ae7aad33343817b7fc61e1a06369a3c7931f86434586bc8518dc0f843092efecb320b214b5b1ba2c87e24615c4e22a57240a329066a9e8631bce63c5875afd0619f271242a9b4a5953dd01e19b122934aa1025d6a569576e8afa627cdc99f1eee8d0afd35b41f09bead5466a23bfe0711666371aae9d749825a58c213854bd9a9cd6ae39bfe5a23cc7ae612fe48f865c407d5c2e8ecceab792d22c8ea6d6550f74b77ee3cbc9eeedaf47b04a305c8fabc71b26ce139eab72ead29dde32b24722325e79e59f1832dd4da897d79e22c52fa5d7413639183a6952507e94da7768ca282a969dda525f131f554dc6f0f1009a370302d670ec58c72c26333336ad343e15363ec24ce1b6cc4b8fca9c456b4742fc9327bd99e27b5437b3cdf2b752e01cbc6a2cac9229e305957821c8ac6dded08a3c4dc964f16c75405b0c321f59c92238b42b9b8a458be7c1d8ea8d5ea020a0fa3695e0f14453c8e95dd2801ad4039ff51adcad06c2cfc2ebe09e3961eb75fa94910bd8c479a5d6c666290507d231489c443d2a1a8e0dba6f17635e59c09f51971442e60ca968722e2e7b6b642128c0668d11ce4085be8cf46691219dcbb50cd7e5319e1ea443c577c3c245e2a5ab68d4e734a04bf5514b0d2355a2731de183006b6d995784a9c25f6f70203bc607da503c240b33deb6867d4bac1ef38a7a83cd021378587fc84ab395681a9d6f20eabe33a3b10ddef50692b14e7053f52e206ac2a4cb108f2bd90efe0135bccf77169f411837b114a2951026307fefbbb906e042652c9557caf7df38d8654d44ae05871a4f1221d589d27d74066f94cc41240c28cec93d324e9cc9e321a3986fd1cf2b9769ca2918fc503acafe45e9ce9b96af7b5e2223c347d8aefb64cedc51d8391b46b5b18a8e962dc91c7bedf722296542ded493d402e12988c2eceab956d6b94418486d8156f2cc5f2000167d8d55d2e08c53c727a7f4397766e36dcb8fbaaded87b89cd01f403eaace3df5f5d326b1cf0c01e33db09d86f089549e0720a88e69ae952d8ef9b17160b09f64bfc2124857bc5ab2c81e865958a9da42e54899ff3b3bf5ef32475d778273dfa8772d1af805e4f1b75fb941dfe9309f71229b27508ee4b843d3436c6981a6c5af6881ef1cfde087414feb7df4f58ecb0af75875e13186e04f7ee46ada5d2cffc9564ddee50889f0c00e7aaca608b0a74d1cd8fa566a3afb0baaf40e9a2c848f670eefa2de62435503bca46d340408cdb598d9db4800dc17f05c06c8ed50c0c4013cab32526559101ab2e6f3e688c55e9b47b04452197e6a6ed96feab30263504b9aea07c0efda0939a1e52fec1a31a02aea711d5aedcd296a89f76ae02a15905559318a5f4ee9507d0675e61694c3c335c8371bc3060c361c614b7b0c9e53e7be5e96724fa2ac94a1c6e77bef9fec2bf395e88278c5798aab38869b8abfe9cb680eaa5571d47cda1483860cd54b54c9c24e1285efdf3a954dbcb0f44f033ee3029f142e37cbec8e1fd88d15bbd901d70165605c4f5911fbbb200661fb40a1adce9561dc42e354ff48bf473f2e7fc5479d2887389d18bc4b0e9ef3813f674720fb423b0965291ef60b9ad6dd1d882dca3c2675f6421f7a8b06186f397d6a3478bd6151e0cb9a6608bd48270ea82629260155dab0b97cb46b41f03cc9715a8f24f35798e4408ad837a79127fca4a62406e8ab7ca9236859a42242ae456ab7187799e97617ccd64bef4d2dd1d009db8ed47cb7216a95a5f49adb0baca3af2310b1ca67f19c6e91daa00a1f5264f3cf8b3ea105355fc667eb1a25f8c9b3cb0faff2a980ebbb63052930a2433cc012e1a35786f7c95842f99d09aa23c3c4b7a3795acf9574d454fbe11dd30e5a47f4d867ccea33479287e6610a0d0999fe867c787696c377b8b40bb3c4c3c9a65fba951ae483072f51178ee93421801cbec1a25f6dbeba437f3e821a639ab7d0d36a7ff6c84396699b8859d152d95ef7306eb45ddd32ce1592e42296cbdae196643f0c254f6015e73312427ab58791b2f15bd525e28c5f24cfb9336d7469bc9ce2c221f1dc31dc51ef5e8b75e3d29b9fc22939258b05c85e4b1b76cd5d60c6bfe2496384ce1063c4ce1898fe3c4b53f6cf20da9f900127e973dfeeb60f5db1ff833c7471abf98aac53a5dcfc39896a0a1567672fc6c98b0d063f906124cc1b28a5ce0cbfdaed2a9e46a9202e93ca99be1cea2881f8a0c87218972c4a1a102019da597b66bf22f6b137da61220d8f1e7956e648c0162b80b59735248b02d0f485799e62987c0c7f55f08e2d865f0d4a55311fa45082f33d6c91259458fdc7b79ce1fa166c11bbc140235e791758204bbc2fe6a953096757b4a15774d7e13b5664b319608b5f32a31a64ec061e41ebd15381b4d0b9e3e4d1f22a167741b364ced0d171211cc31b0387c1e8757e7c136d4ddc4a1942fd1e7cd5c7086d71817eb978ad5a570361b18bcea05a85f1c365d0003d4c8dec323f625490588ea1ab846262aee54a00a0e5ebd8a2e08459f7ff8a8b70ddcb996503826efcde8e0493dab166aecb9b6e08624634306e894493777a50836cd68449c463326b1cf51f7bc19c69c7e868fcfebfc22307be8bc72515bcd3b90d7a3d311714931fc9b5013c2ce1836d266177612b60d07bff104eb10b9aa850793e6531fcf83ac8f5a75e38a23a0a6812b2fbe77abc85af9ac2adf3219b7c448573613bb720a5a52f4f96ea567a93a1084e764d3caefa3c97c87ee4fac544eb3f81d71222ba5bde709fcad21b92311e16dfc54cfb042319a90fab7343718d9283c08ecb7d5e82c64402e91933f440b84c40e1968388186e10e9b04ad075e9d761b824362fd72ea2c2f151dcb4fc444f3961dd5c4826a566d2d334294d3753ce741b3c8cf01abb91d65e08c3b49c6d4d92cf97db316571bd785461e73f7a738fe7e11673d0c0814fa72bd6b56a275ca9e6e1a494bd89215af40b215adfb85b9a9287f90e26994602f6749b14e70540002d8f2636bbc36848ecb5fe8aa626f6fac4462840ec3867001c60450acc2440765d3919425c8b3ee3e9244b18c25046e48094bb9caffcd52cdbd4dcbe233b75d5cffc32843268588006514d15f8dfd179f9d864a1cde2462f6112cb5fd9703ed35dc7fdd39178bad9fbf6fed82c60c340b27752c87a67a558adf1fd732ad06377b8ffe24a9ccd81e14f5b6b0964f0242751af4a48fe48297fe2f8caeb913538f347fd0756d94a4c0aa8e1333dbe088df92ff355b22e4a40cbde1496a8e81e08d4ef80de579087dc940754ca1c20f268b756e5cca658172c8a2af9d5e090a827ddd6eb52d") 07:43:36 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="fedccec8e789c07f55e7e58c47a069e812255e17a56725c3c6c02b0ecbbcf100ab03d56448edf8e7d5e55a603f8a4a305955fac6e60b81cce3ccc8b452316c2de61ffd18b2be1b8c94f174a6f3c4279ef6e1e2aa16870c39b9bc9c75"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10600}, 0x0, 0xe, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x4, 0x70, 0x9, 0x1, 0x1, 0x0, 0x0, 0x400, 0x800, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3ff, 0x3, @perf_config_ext={0x0, 0x3}, 0x12, 0xc296, 0x7, 0x4, 0x8, 0x3, 0x9}, 0xffffffffffffffff, 0x10, r1, 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r2, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r3 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x127203, 0x2e) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x1, 0x0, 0x0) fcntl$dupfd(r4, 0x0, r5) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x1, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r6, 0xc0406618, &(0x7f0000000040)={@id={0x2, 0x0, @d='~\xb8\n\xf3\xf2N\xf0\x86rjL\xea:\x15L\xe0'}}) 07:43:36 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x42241c80, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x102002700) [ 119.873777][ T4335] request_module fs-aufs succeeded, but still no fs? 07:43:36 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6295, 0x302a2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc, 0x80000000000}, 0x408, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x25022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x40000}, 0x0, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000240)={[0x9ba]}, 0x8, 0x0) fchown(r2, 0xee00, 0x0) r3 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x1, 0x0, 0x0) splice(r0, &(0x7f0000000040)=0xffffffffffffffff, r4, &(0x7f0000000080), 0x7ff, 0x2) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x5, 0x0, 0xf9, 0x0, 0x16c, 0x1080, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x2, @perf_config_ext={0xfffffffffffffc00, 0x6ef}, 0x42043, 0x3, 0x0, 0x2, 0x8, 0x0, 0x1f}, r0, 0x4, 0xffffffffffffffff, 0x1) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000340)=""/94, 0x5e}, {&(0x7f00000000c0)=""/38, 0x26}, {&(0x7f00000003c0)=""/192, 0xc0}, {&(0x7f0000000480)=""/189, 0xbd}, {&(0x7f0000000540)=""/168, 0xa8}], 0x5, 0x2d9a, 0x1) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="aa8e1bbf63918c3b78fa73b1a4519af7cae917b9ea4137d96993ee534067372145b2c45a3b7d9d09377ad07cae301dce8f97f21050f9de4d0657a9210b5d965da39d7c67897c981b63fd815d7d145e643a322f747083962b64b653aeb19a5617004899aff30b74530089df4c1c5a860e3f2abcf031ff5ddd77eb9d67a1cf82700ed113e4"], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x0, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:36 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r0, 0x0, 0xe1, 0x7d, &(0x7f0000000340)="2057ec7bb398f9564c87b704d12cc6554a5253553d119c3edff9f013795eab2ab635f69d6f606e9a4731e83838ceff2d6113d943827757a83ebbb82b73d2b073ba92ddbc7beab9d16beafa2ff3b54385a12fb50856ff188fc196374aab77518906aa96487fa948c8189e8d484c4b6617ca1fa33d1dfe205dd6ae43abc60f55cd263ccb92dca50254023cd18f278bfbfbf689fae5278c79cb8eed6b9fe5b93d3352e7ff35b4945ff0ef76899f3d851b469ea8ba04b9aee0682b5ea90be91a1ab0f557a6047599d109b61df9db4140e9db3fae7ec0799e7803db16da6c7339b063fb", &(0x7f0000000240)=""/125, 0x8000, 0x0, 0x4f, 0x8d, &(0x7f0000000440)="248c9deff52605f07b818140a6b645d9f2093950f26df2389b96294d36b8626f256c3d5954c5de043e3d720d0ace8ba91918ced6416da9902bdaddb9d2cd2c89f1fef765ce61d44487b3c0debe1553", &(0x7f00000004c0)="2d1d907dd8e248f4aaab823344b0ad0507c5e8a50f263d23be4b90002bac782cddd02c47a8fac88fc067e7d15db36573e72fe76181b456eab55b2a4ca80761e1577c809a5de9245dd9e4a96c93918c3b0882a7427bca234fdb0e7b051ad5a3a0d135af8531557e47c4d6fd0512bf9f213e247ab243074025ddf4461882856c2e62147580fe39d05adbdf6b04ef", 0x1, 0x4}, 0x48) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r2, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r3 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822002030006000000000020000400b3d7c52e00f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85c811a54af992da4880348d1829ae697139777dd64e81a1ac4bc7671b8000000000000"], 0xd8) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040), 0x2) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0xd8) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{0xff2c, 0x1f, 0xfe, 0x3ff}, {0x200, 0xff, 0x1, 0x6}, {0x6, 0x5, 0x2, 0x6}, {0x1, 0x1, 0xf7, 0x80000000}, {0xa67, 0x35, 0x3, 0x1ff}]}, 0x10) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x0, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:36 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) lseek(r1, 0x4, 0x4) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) clone(0x44000, &(0x7f0000000040)="ba652c52e65862d260d20fc59ee3e1e152497a392e9b6cac34047b4b219473013b19442d82bbecb24f786a0fc146b57dc81a2ae4cdef9444b0652ea3d48c3e801fa3fd943f4d9c3f7290ae05a280bca5dab625107491fe7d0c6ddf46e552b1dadfaef654b47b1e32378eae040ce8caffab4246130f3d9c", &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000001380)="e0a803ca92bc8c59d8310d21f8f8cf9a15a2d85bc92442cdae788e9426c641924457a39cdce273414c253674062a1925df4e302e398af86eb0932d0fb3cb7b6d424b52ac1173ce97719c3b0ab48ba4ba46f2cebfd01a3e3d5ec5708088d19feb0a7b363bb62f864ee4324fae12ddcc6b78073338f1ac9ac8293a77848256e884afaec327fc349d45aed183b75fc4262a9aa817fdf953b831496a36baacc4fb83c01b73d96c7fbedf5d035a8b996dc23490b1509e5628c43dc37d73db62dcab60638b49273fccf0bdc5") write$UHID_INPUT2(r0, &(0x7f0000000340)={0xc, {0x1000, "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"}}, 0x1006) 07:43:36 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x9) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/packet\x00') syz_kvm_setup_cpu$x86(r1, r2, &(0x7f00001c3000/0x18000)=nil, &(0x7f0000000200)=[@text64={0x40, &(0x7f0000000080)="670f01c3c74424000c000000c74424020a000000c7442406000000000f011c243664400f01c3430f015f00c74424006a000000c744240200000000ff2c2466b89a000f00d80f01c266baa000ed0f0137c4816175a2cf000000", 0x59}], 0x1, 0x1, &(0x7f0000000240), 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r4 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000540)=ANY=[]) fstatfs(r4, &(0x7f0000000200)=""/131) pwritev(r4, &(0x7f0000001240)=[{&(0x7f0000000240)="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", 0x1000}], 0x1, 0xfffff507, 0x6) 07:43:36 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@md5={0x1, "524ba867aeecbfddef17b1c066f4b873"}, 0x11, 0x1) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000280)={&(0x7f0000199000/0x3000)=nil, &(0x7f000004f000/0x1000)=nil, &(0x7f0000758000/0x1000)=nil, &(0x7f0000712000/0x5000)=nil, &(0x7f00006dd000/0x1000)=nil, &(0x7f000032e000/0x4000)=nil, &(0x7f0000010000/0x2000)=nil, &(0x7f0000008000/0x4000)=nil, &(0x7f00003bd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000044000/0x1000)=nil, &(0x7f0000000200)="ccc9794444a6ee163c681887bf4b2ab9a7bed319ef497fd58de4f539e568b4c1b24d00b808492e4f84d956d2467faed07f3504ed7d4d15ef6651f00821da977ba01ed10627adafeaab77dd0dcb0f2babb7e7358444338bb8899002cdf7ab4d1ef9ada8b9ed945aca393cac443a01e8d4b7eeb8edbaa12c3c47db10", 0x7b, r2}, 0x68) execveat(r2, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, &(0x7f0000000340)="6c95be527a1052ee28c5815e516b3ded9f9f24b041e38b54f693b3b5d816a6768d00e194f476f107f2d51c307b267224aae50704ebee700c3ecda5e98dd3e434aed741d369e4d86b3fc3e0ec995f128b956a025b42f090c41328550414eec78a5396a951e7493b6b738b8f3af69e5f0f3a4d606439ae512a581137f55266101b20dc979ce83b30ecaabc690fa3c6eaf235d1965879731c897a6932e2cf0f949c5bb254a3049eadd92b839e952926d9c8a5d01809b7df1a61497e4610701e11651dddff2144871fd736170e7e76745dfedb879f6ec05ebe5e15b9c209c7e87331823ab366ecfc75c4bd55fd0a2b56351d024192b1bc5e09f1299734b0e1042337af4ff581bf119a7c5f8359ffba2a58f9059d8bbadbc5bc74b369d45e576d8e3629c496210cc06ec078fe23c63de600143ab836b012b7aad8f7cc21a5b5c90b2aff12cedd9814bb3d1bb5c1529ef0b33ce07259f238d525d40e9ecdee93b67c5dc5b8bf73a2b94542daccfc9dcb1224149d330b12fe82c76675393ec2e859e6f5a9bffaeb95d94469b47b38d3b729c3d65dcf82ad13a18878499b71a8ded6ca1a26f74f5e2d7ec27586d35a9e34d691e950e4a6d3a213d6cc551d47a20fe52545893a86cc29bbbb92dc67b104b6973aac6e751d3afa4bcbae5b8d35030ca234bbb9f974322b48154fdf76df922d693db37b0bab895c44e82e9bab82da690af383efb63f306d52ad79270858260544ee5fdb7f74d477bac0de7e1cf90e0c4f1b5474196e01bb7d372c203aaa50d8e9f3e8b08aa53883067b693714075b62ad48858140468b946eaab8640feb40d3cd327cd4905c93b0adea0c233408a9340c1520d19ec5d3038ac34d9990fd1f5ad0a31bfde96900562d0e3bd68e81d5b37188b1157fc8ff89f08aba3c9269bae85b7d91dab1c4e6da06e683375964c6a69c5d72ad9ea3eb91ec0dc73c29870a07f16160842853914fbd42d59edbd86f8dfb61e57ff9368d1cdd7f4a58e4583d406ef55f92e99fc07a7be514a3135c046bc7b35a88061206762b37756ac59cd8c9f6956a8d5051eda548d18fb91158afa2c2069866d0afb027091d14b13941ab0142d2995307bff70f87b3f6f86e19c94417aa0c3cdaa1b95b9791f7f68d9a6f836a4df7dc14882f5f79dc4ce6e24472384c1b752364f09134f8ca38bf341f32b298ca4ac714f202e99e60d45099c0cd44f704e2ccc9121ca44b2a498f7d33c2d48c051abe5d59a099bfff77b76dee548ce807cce0930a75c1c4ee8739f955bebbb486c3694b2fdab734c881875d371f83f3857ca4a88e5dfa95440139f8ac02b759d83ee40691dbc1b6c01c660a181ac1844e2618439cf54b94ff1ca19b78a382b10ffe198a0c350fe344f58396a6419627649e1f8dd53599bfe4998fdce6142d2e9d112a0bb325a8ffa48111db6d7bae9410bb62dcaf7e6b67be576313b08c8534ab567c0ca351c4fed67332f8dc509127885bd4dad4e9b2cb1a8f5ea972cf607fc319815a159c052745ed842b90a612b72507f05146b37774c9bcc2c67472db76009681cfed4cd61d2665e3410f883da61bba0006455f54971787dda8bfc6113356df62419e8ad6652aa966888b3f12efe17a342d5e141ed0ec1fb262bec73e7fd0b75685cb8d7c3c2e269c4155b86b033a0704afd6c44961ed2d91729e0bedb670590d013c3f0be4a2673542a2e10fcc7aaadda9da946685045aac632972eb649f4b0f8244f32359d0d6ab23702c150b62257de18a9525999e8087ed508f9d14b93f50e473b03b7f431bf3f3a28cb08ba04bafcdf64512b5c7e1ab98e6756c10f595e4b56dfe3cad3d5c333b833d87e6192b50b39abf2f43482e578a361dbf86871b45739a4f6497e0bda3baaedd9714da4c1f93608bc83c9cafb220035a9da721b257423eebfc490482ce1b751634e10e6666307f1555f332d89f24ed11cb0f3f6fc2c0fe55e7078d0ff5f67104ddbc3f93ba04faf921685c203601f80ea960e6be8ebc5cbe8efb1dd201f6d4f61359f5f41c471700864675ed5abb740750364e011cf6b2c062a9363dc6523fe302f1993d23201de18a362e31e46904766d15e73807364a735365fcbcc89bb7b55af2307fde1af805b811e10acf00e12ce09bcecc70adbb41c9ee1b25debf0dd48322915ee8de416d467f817c14a0f659e689c9845241a9b8fbd2d12debc4b3a7f9ba370ed880aab8933ccadff7acdf06ee97e533b65ce8a9a37338ccc4fecccd452325a6a81ba8340e49316f9a89cfdb0b35250457d2b8088b6cbead8b209bb2efae63838e06c1a953baa068967ea7fb4ae0388b730a8244132b6664d17b757f38536b134996a9b0200197ebb968c6d284a1d5c0edcfa0ff206755e04bc7a70bc6cf67d70fd570d33258b7e0987668b06c13ef76c30993ed1eadac592f6a43b1ad6bf14e08615506587a3114e68618511659d1fb7ec1aaf446b4e094ba70a917664f8f1b65664b69444084ae1e8662f5352baa8705aaa87442e6387d4c25b84d301aa3d27b477104a3b61bac977ccafa8bf47c9f5f241d4d52e8e7b7beb68105256033a72e2cd6103d002d7e9014369e0c990647901c73cd126312750268d8f41151bc631440f20d4342f3c0b9158e69e1fe62758b1bcbe4b3516425633c167f67ac81d5d24e17cbbe524e6946719507c3e4434739fc05fd579117d4a41abc2fe2640c883e0dc9b1875c5abeef08983405c06fb087e4e50e4800bf3aa667455ee75eedf5544d5b683cbd1708004f2245b2e881bf194ec06c1c37da85fb0e8d9d927b7a56a7431fe9e150864b7d1c7c0ec1eddbb30e06b63d0ee589270a578af60e55ec8bff79bbcb5ca2d51695b37f52774c0e1ed7c124d964611286a5f37c764f2a20c6ce1cab2ebbb8d49338c02c08847e1cbfc82d08d3add9f4e2fed75fcdec2431a0bf7c05a883801acc20c32def1a0c983bdd79a02a753abcf51948ca91903d18e56188222bdff36ee276e494b890e01d2d10d082bbfc5e67d27fc7ea118c725c4a53cc89116434ce79c55a95fc093130d3177c06139e907f392df9198fc2faf21cc7e3b5983a22700f808320aac7c797c2e527b76d25c0281fbdbcd5dd572b6617cb3018f4587a7059c4754351930d6345c70c56e6d5fa6ba2289c0212f3156c10c6daf71427bd9f7004a209d87dca06ed602987321548b557c6f29bb5622c01244ab8b7d73fa5d1438fd12a0e97e316d95ba079dc33b18321de3dbe4622df241ef3489557311c42abfd0da3e8893ea1e3d0620ac9dc671103fd7b71da7475cd24211e34604ddfedda6816287627be20af6269704c5d6315d53cc9da933faa27fea128e2e46afae9db7b7c3dffbd3bc41e9009fc65121770ba072f32c4d333b3987481d52572170aff4e4ac175050812bc6f711adbfa4cec8d304760bb5d3cd85fffed8c4314cb0e0f4e64982528c94183383bb1c8fc4d987377587831fb842bac02d734faaf1981e2354b25b6dcbaa0f1339714cc46bd9fd496daf5abfd14e23693dfd815382364b114bea4c5f7375ca50dcbd84fa53f92448bc0d2eb3d895345fb2adb0f8f6f07a5605f27a175d1dd880830c7ffd8fee078abd42f126d85d96a27b609b5994ab984700183712ea39e3d6cb4b5b28e0ca23dba8baa356403954827ef4ceb1a62b38e20798a32c84f29dc2bd85b4245d706f832f30c36cc134920291d35cdef327aab88bc1c52e04dc8ffbfc60147467d818ecff7f28c2add01933a3b38b81de6aaa87a3437b643eff37cc67c5583ff66fa09d6ae18ae9936a9d13975199d5b14180c505d367ac7f678b5d89f17027ed1c0285818f6286241aea30c5b6690bb6a2f0e580b11091119b13b7c8593305817eb01a91f5cb1293904f4bebda879011436652e2bd7fedc2ee8fab29af376a5b85d91ab2d4e67c0ea532489c2631371154e12c7ab6b99b3d44c396db29801d0b78ec461353c7eccdce9a9b921251f7a4958a4edee25c21fd1caa0777e9ddfb005ede220721377879ab4651864c8dd702e7da6e0c46428006bf1f672af226134cfba7a81bc2fec5fc9747494e2b09be7171b95c95c02a41ae2eda4c0a2fa687e725359e846023e31046bbc48551d336488297f9b72e07ccbcbc1d1f64505141f2ee9a824ec0fac2c1013159afadda262ed406220ff253f6cbae60b3baac1760171e955d62bf17525eff419debb8481fd67ac3ba59518b363275f3fac09c079a82c25373d8ad0e43dc4b126bd51ab054863163a4b6a9462ba3bf57466d998a2c5eda266ac8ee7343bb58de7e73fde0741b4c8abf643527630026d8c5f3a8a60600a89c56b40dc671dde814e10a1ac481a5299c31086eb19396dce1d40ceed6bdc1a1dee7fe39922d702075e804f94d50215b701a0c5380aaee440c130f1b46d1c02720866b2b0a1b153b1ec204ebfb1d13b741ad9a85da4be3c527da55ce28899c88fc66af86f6f29f34d155bca5793b338f6c45a6cb830e2d042d870fd07ac3f06c6e30a46a844806114e9c042312076d2bd0922ae1fd7fc56ec3eedf63d227a68e672552c36f153b5da0f297077b0a97c1c7111f27dd1c3eeefb4e0df02cbfe7ff57c329722429165ba9a7be5c1de5f52d5a06b754013d4304078a312d4aa6c426cede964182e99630d2fe97f76f4b7ddf9f2c4e209ae2ab36a6687fe425cd901dd20c3ec6cb4b7dfa579e7c6ca46ca8f18e1d17d49ee80cf1afdd4a4d2055f065342e36d3815523e628cdbe947ee80137f4b1a56e27651bffcbaf973c5398e60a6622eee2cf9f40208c984940425836a153ab3d24c6376fd8d1e9eb94f8f686000d54f16272a80a8e50c9eca7c5cd1f26d7db48fbb8e40f494c594f8a90899a01a17376ee33fcb96355a3c38da78dabcaca6a76f6ea9af71578698e2a365ef314c3fc5519b7ea170ca81219d91243a95fdafcf57d150d4415a9bb223d9f623fcd504b81331afd62eaa3709fe13675327fe91ee1314ee0e5336b0df80f9e00c49fbfa8c7a216d24e746db7380b53698aca58ced0ea484e8806f48d9aaf67866a032cf1eb5582e9e1ecd49210c803fc3863c82b6db9fd0dc171e5282a83f7373f0c6566ba26286b332f6d84f7fa91b6876419fad78cff35048b2c865748c0cdb22792cd9018b1e2bdea7e3fad77b07ee560b9ca580655dfb628e67030ff4642f0c30817a8f396a42f74c9dc04b016ae20224105c3b2f60974ec526da8b365976efe1ec614eb293904853151528ceac1d50a1bbdd6f7892230c58664bf0a6f67a4cc41359571020fd605e78d4579375a0644b26e823f559bbf4ed6fde03262bedca5b67a83ec7fa442256b66509b78d2e19c12f717044137f18071a3411aa526d1a0b09d79758944f223cf7f310a170b3ca531da8ab521ec3102633d2b0a3309f7e1ffbb92300f73ac39098b8505b9ff4821244c29b871b1c8ed2ad2824d77fbeb9026f1ad91e313596b1993744869fc5499032cbacb636b7f4aa99eb232a165ed5642a03c6a768565d779b47dc6843ead5153d0fe3b0b6d196452fe23c335408cb77cf8811351d3ca0dc762ece56bff448ee02fec47eba3a5df52141925061703545077e9550829ef9dba0102179b66cf63afb4344c403538c024c89db615c0cc4b2d0aa0a696d942bd6ddfb4f1629618f8777e6a6bb871e8a7efc3224e7fcd5a03a9a3c104d7601a1008c395a5ff81d5a4810f764cd08efd9e7eaae0f12502d4931f89e54b010aab57343530f89850e1ac0b37845400705a7a9d5da977591a10009196f4329f48e8d9147", &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000200)="9c2eef538a74d438955e42bb92477e9cc987cb58f34a5d4ac7c5dcac3c8c2ba7bd4af0822ec72c846c47911a312493e8c1431caded19da1efdcf1e19a05ac2c204625139a74a90e8c6a550463d54cee41ca433f367114fd49fdf673b637cf7da454d2daa28e212345bf35e1f6e41cab0ba9f5aa4614b31ec303544a0ebaeb9d8b1d4f27f4d88a0ca51c241149c2e55d9e62214fdcf62efe2fa70fc2304e24fb317615851106764cf2393d9ecf0b44636921001071f11fe7e6b273f48338ec9fff9b197d66c") r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x0, 0x0) sendfile(r0, r2, 0x0, 0x102002700) 07:43:36 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000032ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7001007ea85ca6576b9a992da4880348d1829a8b97139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x35272, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x821d, 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) clone(0x800000, &(0x7f0000000040)="a96fed89875e3f6e6e86daf0445009fc2ae0a91d1f080660a5ba09dc4d5f5e940a67d48245d840bdb485c6df70a79db46a666db9be17cdd0b2a9056b691d6f83a377e18b1a13959837c9ae849de7976196c35efc676b8d728f7ab48cc88c089ac0be9ee87750b4d0a7cf2ef6bea60c148087feed5dd9", &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240)="e309e0c47dd4d03f27be3db5da7f5d4aec5628e70e57b1e1b75da9cb7059bf4ca2e5b073bdbcc378bb152ceec6d69cfed9e40690e16480a878d45418e95ee9b259ffcc58909dafcb7965657b8652ccf418a2f7fb8a50f2fb8336d2b2cbb6686b9623b6204c0326c7475b1a9e540898c05949a20173a9086c28a6c98ce579038354b0800e41279a4765a49a6d5f") mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x2e0000) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = syz_open_dev$vcsu(&(0x7f00000002c0)='/dev/vcsu#\x00', 0x0, 0x400000) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x50040) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f00000f9000/0x18000)=nil, &(0x7f0000000380)=[@text16={0x10, &(0x7f0000000300)="66b9120200000f32660f3831d266b9800000c00f326635000800000f30660f38828d0040b8f6000f00d80f23a9640f01c20f20d86635200000000f22d8260fc72966b9800000c00f326635000400000f30", 0x51}], 0x1, 0x22, &(0x7f00000003c0)=[@dstype0={0x6, 0x3}], 0x1) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) clone(0x900800, &(0x7f0000000080)="0d178ecbb42df088ee696b0069b457300e403fbeb921b852dd8ebc54f776024410b59630af71ae0088", &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240)="0be84d0833501fa4a1dfda12a7ed1e9ec4b3da010cc5764f28684b672a0329327b79df96c842647d17019600ad97556e3fe4f36e30116c7a14c2264631b63c88f4491d9dd99894b274a81453033c0c5b25e4d63ed60f5cf8827099f92878ca86b4a86e04cdf111e794bc5b44fd76d6153788ab77ec48") mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000400)={@multicast1, @loopback, @multicast1}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x29, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x3f, 0x20, 0x2e, 0x8, 0x0, 0x1, 0x1502a55e62841cae, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x399, 0x2}, 0x8, 0x1ff, 0x10001, 0x9, 0x3, 0x4, 0x5}, r1, 0x5, r0, 0xa) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = accept4$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80800) fremovexattr(r2, &(0x7f00000000c0)=@random={'trusted.', '\x00'}) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(r0, 0x0, 0x0, 0x0, 0xfffffffa) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r3, &(0x7f0000000300)={0xa, {0x8}}, 0xa) ptrace$setregs(0xf, r1, 0x7, &(0x7f0000000340)="eef75e1e0452329d33012e279c9b58be31cfdc9c63fb47a977fcc83c9f77400b562db33a05c2e9dbfcd52badf50f118b7e7c43d16d6902347d43554d9fdc4963de1321ef3216ad51fd836b54a8055e33fd7ebc4ff4763f2ff85d60103a7e4b0690951b623e655f536ac552d373c9ecddd823ad1ac4e66a4de4acc248b7243d9765f33eb227272828b9acab8b556c5c") r4 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="c595658c8f9aeaf2e2c1"], 0xd8) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = clone3(&(0x7f0000000440)={0x8890200, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), {0xc}, &(0x7f00000002c0)=""/30, 0x1e, &(0x7f0000000300)=""/197, &(0x7f0000000400)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0xa}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x2, 0xfe, 0x0, 0x0, 0x0, 0x404, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffffd, 0x4, @perf_bp={&(0x7f0000000040), 0x1a}, 0x8030, 0x200, 0x2, 0x0, 0xf5e00000000, 0x6, 0x71}, r0, 0xc, r1, 0xb) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='9p\x00', 0x80000, &(0x7f0000000540)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@uname={'uname', 0x3d, '-\xdd\x93'}}, {@access_any='access=any'}, {@afid={'afid', 0x3d, 0x7}}, {@aname={'aname', 0x3d, '\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8'}}, {@cache_mmap='cache=mmap'}, {@msize={'msize', 0x3d, 0x6}}], [{@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}]}}) r3 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x1e, 0x8, 0x8, 0x0, 0x0, 0x1802, 0xf1462565375469ef, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x10, 0xf03, 0x80000000, 0x7, 0x8, 0x4, 0x4}, r1, 0x2, 0xffffffffffffffff, 0xa) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000080)=r0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000340)={0x80, {{0x2, 0x4e23, @multicast2}}, 0x1, 0x2, [{{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @empty}}]}, 0x190) 07:43:36 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) clone(0x11000000, &(0x7f0000000200)="e71d1b524d93f54c862fecdec7e15e453d13ff0276c6d802e8dd87773c47319bd367cd009eff993b86c3018e22553a6e40e9d2993fd4ea872fbb9e3074d2e1263069866e23cdd47a4614bc7b29bc80d241204a33684d49bdb57c6a2420118471b1f205f44eda2ba130728b0438d25f4f965f360c4751fea1370394e221d06f11e0fe6ceecb52941688036f16af9348c39028f6369ced986bba", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000340)="ae0472a4627978a4e0bf011307397f98716a403f43df4ca263e9d1619173edf3685a0f01d175b78c37a78aed0d619b9dd2c95ec18928d1fb92d6d7e54ff99e707da4cbd9931d242de97023a1a1d9f485f3ccf6c3") preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_script(r0, &(0x7f0000000500)={'#! ', './file0', [{0x20, '+,'}], 0xa, "e8079823e66aa050fad7bc0034d9fa6e565d40d0ccb25fc875ab68f7cda789809ddc039bf45196b7589d96411f9bccc194c7b4701e2ef48d5794e329d9b03540d4885b99400d55aec110a79b446870f147128fd4bbda3349d5934e82d89cc6179c54ccd20d25f71d559827aa36"}, 0x7b) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000002c0)=0xc0010100) write$UHID_INPUT2(r0, &(0x7f00000003c0)={0xc, {0x97, "5767d7c8b33f306386b92194220d4e5d25553eea0da419725a29c9082a769c3df0a4196687b52064caaf834b410b985e3defb91dd4115423b0bc418bb381d66d4a5c42f22f4068f377c404af2304497e2de1bc5ebea80562f751f003c18959237a3452c5e488305ffd37d51ddf458e35bb41f7c21191bf60836257d6b2823392383b6fee99f9f63564bebd346b58897569b608f20c5794"}}, 0x9d) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="4a0180000000000000de9a3ff92fd5c7c7b5f2917da37cfedb3828b2004e7aa56f5bc3b5be73a7b834630e19be3fdf6de50dadba079518a6ad1af41f6bffa0b046f2c5830ca030a683d4c420926845c748a3789a58294513350cc17ac8850d123f"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x102002700) 07:43:36 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x802000, &(0x7f0000000200)="43aab84343da7abe194a21b5e7d1729d26f73932f68b8fbb56921f69e7439c4cbc51a55ec2c928b7499ae12d9205286d1694781bcd0d9e07be8983d10dbfb321a420d3a85bf8d252373fd6049a6d1629bb4a9a2b91525dd4b86850d2a1c0a461dd6edbab124e86854782386a9ff546d9b8b12941f90a6e1fa7c3436e86daa178165328a80c56357c56823b414bd607d76da590ed91fdcf70934adecdddd6b2312d535504bd71d42d63de5f9c87960c9733b02c51a2218c14d1fd5b9bb8ffc83e2f5f3b4dc8a59adbf00ac512153119f7280431a2e3c69c4965af1867", &(0x7f00000000c0), &(0x7f0000000300), &(0x7f0000000340)="d99b3c683a7ed14cb801097a6eda34e6726976336761031077cdb2602353c5d97fb96d9dd4aa88f67f44ebd1e4c220d8a73670d5e932046506caf81e40c51cd705caeabed50c829ebf0893df729d8ebd4fb2010b8a2a84fadd15c44412c549fef2ca1ee33b8adc17d1827304a52df5feaa1dcb176de099d5120dc7941283ac79962e535c9bafeecb99c4fea864475f526a5d1d4a8fc8ac08a9d968fd") r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x10082, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r0) mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0x10c) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xb0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_INPUT2(r2, &(0x7f0000000040)={0xc, {0xb5, "48a4741f2f6939a3eb55bc5267375ea8a87b5296efc38380a78eb01e19eb8f6d80eb99044df2d240ec58716fdc5769dfc1d8b74bed6d1fa0477c84cad8d3bd62b3c425db615ce750083722ac329994c0a5871bdd381a54dd4f09a90c8aeb7dcaf951c8ab918568abc81aaf667ed260d8b07d4dd45133350d98ed40c22cb93518ce64a1011c0f93bdca16af5081a1aa16ef3f2f4a6dcb71a8780a00093e0203a227b310cbd5b7a6488e6563faad1f26e7b91e9fd650"}}, 0xbb) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r2 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000540)=ANY=[]) fstatfs(r2, &(0x7f0000000200)=""/131) r3 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000540)=ANY=[]) fstatfs(r3, &(0x7f0000000200)=""/131) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x1, 0x0, 0x0) r5 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000540)=ANY=[]) fstatfs(r5, &(0x7f0000000200)=""/131) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRESHEX=r2, @ANYRESHEX, @ANYRES64=r3, @ANYRES16=r0, @ANYRESHEX=r3, @ANYRES64, @ANYRES16, @ANYRES16=r5], 0xd8) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) write$P9_RREADLINK(r0, &(0x7f0000000040)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) 07:43:36 executing program 1: clone(0x4210000, &(0x7f0000000200)="a04fc7dc072dc5826ade4fb862a72d37c5c16b601fe9c83c1210295e85e852c756bca708719337e3c02ce721b5f3872e8910ed5938fec9a10499175456f7fa94980093d5969549f57c6fd29186fcf3c718dc94cd4ba299819fe9160436982638e6e320a1b41b4799847d4e880bb40fd219221611e59675e38a0dc75b216c164ba6167e88132a1a63f0b752e5d2bbbd68047aaae59e45f10bace4adfe5fef0cf2e2daacdd127900b2a7950ace26da571f8fa97c89a54f7f8dd8af459df8430bc4644f47ee099f291400553785480febaee6c4e8af530dd95595492b3d820b61735b", &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000340)="d4e0de9090c983e3a1766ed91c0140c8dc67420bf8338f18cc81c46c41947a87d9f307e33b78a240a63e160ba8515170e4cd747635e412ff7117d0d06fd785ea4b121fba8c6fdec45eb7886fc24e291662fc277d354c12d04ef6f912287f96004969ec6ee01cb36728387b769bd2cfc66a11") r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x50, r2, 0xd3299000) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000300)={0xa, {0x8}}, 0xa) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000000c0)) r3 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x0, 0x4, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="5d2975b54336a0788a7916598902f7dd378e2439617f0b1dcbb0e014a833ff7be60e7babf25dbd9d10dbb15ec4279deb6fb9ed1daa5aa1b985d2775f67"], 0xd8) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x102002700) 07:43:36 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000400)=[{&(0x7f0000000200)=""/243, 0xf3}, {&(0x7f0000000040)=""/51, 0x33}, {&(0x7f0000000080)=""/87, 0x57}, {&(0x7f0000000300)=""/218, 0xda}], 0x4, 0xbbdb, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000440)=0x9, 0x2) 07:43:36 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000340)={{}, 0x0, 0x4, @unused=[0x6, 0x1, 0x8, 0xa6e2], @name="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"}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000400)=0xfffffffc, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x4, 0xfe, 0x0, 0x0, 0x0, 0x3c46, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000580), 0x2}, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)=0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x80, 0x7f, 0x2a, 0x7, 0x0, 0x6, 0x80001, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x401}, 0x410c0, 0x95c, 0x6, 0x1, 0xfffffffffffffffd, 0x77, 0xfff9}, r1, 0x2, 0xffffffffffffffff, 0x8) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000009df082000000000060000009507280000000000000080122000030000009500ed9f3b7cf000000000810000753b202c28f3aa13b900000000004ab46b81"], &(0x7f0000000080)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41100, 0x5, [], 0x0, 0x0, r2, 0x8, &(0x7f00000000c0)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x4, 0xa, 0x7, 0x5c245e39}, 0x10}, 0x78) setsockopt$inet6_int(r2, 0x29, 0x35, &(0x7f0000000040)=0x2608, 0x4) mmap(&(0x7f00002d5000/0x4000)=nil, 0x4000, 0x2, 0x10, r3, 0xe6f8000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000002c0)=0x0) ptrace$setopts(0x4200, r4, 0x7, 0x58) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r5 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x70, 0x7, 0x1f, 0x1f, 0x0, 0x0, 0x4c4f, 0x1040, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000004c0), 0x6}, 0x3080, 0x88, 0x100, 0x9, 0x4, 0x3, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x9) execveat(r5, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="143445f96dcf0855c55defa619b2ec4ce12600ce28bef9a61e5c1b37bda1d3f83ccba4bea987f5ce71f2ea76680a38d63403c63fe117e1e46ee11322053772a5ff125f"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:36 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x1c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10004, 0x0, 0x0, 0x2edc1a4eb0ba52a6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:37 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31}, 0x0, 0x5, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 120.514887][ T4482] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:43:37 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) clone(0x30148000, &(0x7f0000000340)="c968123d493817d03226fc97e15670ad0000b039a2dd0477805f783d2905420c78a7c81801946918e6e2de0fb41c3639ead6dba0c8259122e5dcdc129dc15349cf6988c9ec51ca69bc1ef9e49ef082e6597bcc082d3f8a10b8ced1300b38f3c84716baa499a5ee1342ac0d7dbcc2cb40e88b282b6bdbc1d3564bf21ab27fc373fc095f1c6651e9eccc637a9a4faff6af76c996af2ca4fe59b2200bbb163c87ca90b5c984b682cbc7c00dadbb81f08b0c30d814a57459cd7c5ea0d2229873b05c9ef7c54a2b6bc7d9e734ed325ee476488187d021ff029f3e2e2295", &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000440)="5e09b7c2e20a448fb586a61176f72e89cba9a37edb57d9060466be23a8741beafca4a54bc4010fa78329c5d8cc3ef72e4184f993819eb56fa899feec9a611f7f4aa7df72b64db99db3fb555c9629cf64cb40a3237842bbdf438ee893aba09f0ea6b1e0d379434241ec1e10aada6ba32475025b969d33dc88d19c52ce224843108194ab33b89a915ed104f2f705f4f94283367e6bc022193554363530175c3409434c7d45a88af211fc2570f382fbae") preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = openat$cgroup(r0, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x3) r2 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000540)=ANY=[]) fstatfs(r2, &(0x7f0000000200)=""/131) r3 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x80000ffc0000b, 0xaaaaaaaaaaaab3c, &(0x7f0000000180), 0x0, &(0x7f0000000540)=ANY=[]) fstatfs(r3, &(0x7f0000000200)=""/131) r4 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r4, 0x406, r3) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000580)={r2, 0x4, 0x37906cd8, 0x9}) fallocate(r5, 0x68, 0x7a, 0x7) r6 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r6, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000009359cf2724ec65c60402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d600b75ee2b3b54772053a63ca0395a7088d7c27f000000a9030001007ea85ca6576b9a71fbe7a327d5b0579ae697139776dd64"], 0xd8) 07:43:37 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x102002700) 07:43:37 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x24122, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x0, 0x4, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) clone(0x1028000, &(0x7f0000000040)="3b4912516766ba6cb8b1dcf1c19dfedb69b781f100066bb41edd403bfae5f9f987e9a63e6b2df341200deb66a9", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)="c28992565b322580f3a456c23ecdec75bfce21eb798a3d9e19486dc963029d92ba8853") execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:37 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) mmap(&(0x7f0000263000/0x2000)=nil, 0x2000, 0x1000007, 0x10, r0, 0x2d8a4000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x52800, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000240)={0xc, {0xab, "b7391e1b13431eb3a133a74763e839e8ce57495b65bc20b7f102f9fdcd826ea476b1ba92a7d91709c23e72db39941a4ee5d3f9169a2d8fac68fed2e1c4cf562721de46a19166ab77e85b621b5fe4276c2ef95322db424c842d31690967fc17cc93b338d7c9fb7a650771a7121e6362bc8dc101bb167c4dd96c5331fe3f723abd3bc5ea36ce19867b2695777e7d63f51e4f5daff379e36be7a6f37628975a102dc7c2416af3b65e1b995f78"}}, 0xb1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x98, 0x7f, 0x6, 0x80, 0x0, 0x1f, 0xe62a2d464e431bcc, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x8, 0xad, 0x4, 0x1, 0x6, 0x80, 0x9}, 0x0, 0x2, r3, 0x2) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r5 = dup3(r0, r1, 0x80000) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r6, r6) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x400, &(0x7f00000003c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee01}}, {@dfltuid={'dfltuid', 0x3d, r6}}, {@uname={'uname', 0x3d, '\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8'}}, {@mmap='mmap'}, {@access_any='access=any'}, {@privport='privport'}, {@privport='privport'}, {@version_u='version=9p2000.u'}, {@noextend='noextend'}], [{@pcr={'pcr', 0x3d, 0x27}}, {@measure='measure'}, {@dont_appraise='dont_appraise'}]}}) r7 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r7, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:37 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x102002700) 07:43:37 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext, 0x0, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) clone(0x280900, &(0x7f0000000200)="e15b7af5e67e531cfd48e5aa15abfc1e2a348dfe83bcbd4931b81792d93921d410d9c2434a7bb5f3c7ad245b538fa6b9f0d09eaf098a79792c127ddc04ac97e6d9d332ab934d8b3c62973577b577c6320cb2b30540320fa214457ec55c6190126a24ef4d94ca2088cafe13f7ba88c6472eaf8c5a5e642d7bb5b7c64e9e173cc5f9d973a094b2687e05a8550582f24b17c9167f2967de793178b2034406c2e3ba0553936af87c78200bcfa97583a64d7c1f41d729f13a3a7a20fd669d81dde2586b16340a21b9698e6e3690c37c2112982cc93ca210b276c5928395dd", &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000340)="57d2e4fa65e82fc1f31b438fe2703469acea125b7a129d6d8112e12fe36f10cbd12a5f7afedb5c7282b5610557e209aa9cc2128d9c4e7ee17db2985e98ca77e3ab2c2485c412cf701cce1a4d34994f457622011e2b435e32624e14bb9d30fcef067921476b4eb45f2825ca561c17d99d21f6f5641ce08790bb16c8ca6924c4b35c24f404c4d545") 07:43:37 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x81, 0x46, 0xfb, 0x0, 0xd78, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x3384, 0x6}, 0x4128, 0x6, 0x9, 0x4, 0x1d, 0x6, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0x8) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x110, r2, 0xe04e7000) clone(0x0, &(0x7f00000000c0)="eefc4ac977878b9b652c39cf7eee8fe2f933ceafdcf7a0accf4fdb1e56beed414b0db9974e057723a68256f381ca0e0d", &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000340)="c061869fe410254d59726ee8544d98994e1d41b30890ee12ca357e0f58941982dc6a32c74fe6dcd0abda6a72c5cca234705b3e0c53348b46bf50748b5187e2b51b470fa267a6a23c83e6c331e404a58f781ed7f07a00bedc8ead50f6f72199c3414c49e498c473e9cbfa6963369e154036421dd5aaa82155b4e97664aa54df30c61f276cfd87685b534e3a8bc69600610c456fe2f34ef6fd64a5b0272af40861d28c6beaed9df19f15") write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r3 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x7f, 0xd5, 0x2, 0x8, 0x0, 0xfffffffffffffffa, 0x40, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x3, 0x401}, 0x172, 0x100000000, 0xbb6, 0x7, 0x1, 0xff, 0x8}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x8) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:37 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x102002700) 07:43:37 executing program 3: ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f00000002c0)={0x2, 0x1, &(0x7f0000000040)=""/15, &(0x7f0000000200)=""/183, &(0x7f0000000080)=""/85}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r0 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:37 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r4, r4) getresuid(&(0x7f00000000c0)=0x0, &(0x7f0000000280), &(0x7f00000002c0)) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r6, r6) lstat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r7, r7) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(0x0, 0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="020000000100000000000000", @ANYRES32=r8, @ANYBLOB="02dee0c1db04ee7245cfdb33a5fbf7a0eaa903", @ANYBLOB="6dce19b5dbc3d9405128bdcd74a06166c7080aecc7fea729a183acad3a51826545e995ae31910fccad12481ba7964ecbbab7a81e8163dc7e4cd234ee55b8d0effb6469288078d5aae3269bdf474bb8d222291ec5aceee2bbb67a2c7196410f8eea7a2c25fc9c8577cb6d9ddadec0d4f4a2832f69be2bf12242a8582e579ca6cd389c3945d9bd131a9e31fb774422a4280c5f3ee15f43375a3c53a3dda0", @ANYRES32=0x0, @ANYRESHEX=r0, @ANYRES32=0xee00, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="59a3901e0f282c5f021ba7637a55c15c766c34f5bb2aa57525da5517d74a9a392b5aa6d66b41c937758b13c7402729280bc038587df51c9177053b6fb50d82885e9ed9d2f72b4929d9403f0d25df498a9527164a222eee9ff1949dc61185cb9e1514e5ce112e38d38ea82a3fbac85aceea032fc7043cc8471c66b2d99cf1bbf76d68b34ae6a8d43f4f1fc7309bf33d760979257817ef994c0e7b96ce51ed87320350030d12c917ab5f0082600706000000a9f6df31d5abc40d18bc71", @ANYRES32=r9, @ANYRES32=r9, @ANYBLOB="86e48309d416ad3433d5ed8abfcdcb1a4e9c5b853d849bcb1286572c57c13ac2987cf7731d35233b1ed88e9ae7bd98e9db42733afacd850b313cdc01f97bbad1a70cde411496db66b2ab72138dbe9d9a0fef3fa0e81a1d51712c27c0df21e83ba1acae05bf086aa1e104545d78c0ee7a1242cf9d1b5ed2e9852aad4ac785427ae6503a193745fd12c50a0cdc5d9109f33046cada4600cb4ab4c2cf13a8f95912e534ea752472660d459d8e9bbe60515fafc193758397610beed9128b4aa5f9d3c60599d55e60cb7de0cd056f50f0ed1cab74824e738ba84862d7a38dd7d3b96613d6d39e706b169e98cb9029", @ANYBLOB="fe3e44247d675c96c7a5bdbfb51339609cdb35eb5f191a29318a21bb29fe6aac12c1a001febd854d5f24cdabfa8d0b6e87b38db62aae0af3fd435469ca10c77e43e31f000000ad53010dac3e895f9460e89483035a5e069d659cc5b39ba9f9177af97b26f172bf56abeac5fddeef8a43d2d215346d52170c000107f1a1deb239cefaad00342e728bd94ebb5640aa67ddfc36a38a38452dd110a937b26d935e8cdaa117db8ea26d9228ea2df655c80e985f71c2771191b435e9918d300b2dbfacbc12afbb76be19098c", @ANYRES32, @ANYBLOB, @ANYBLOB="b435c4c0b7eeea3a09d1a7f495cf3bf51c1b1f5bce265d285dc644c82760144d59d850d25c67499055497f8103bfcd1079246b46d58d4db0a1002c0faff1f8417c8c4cfff43f5794a13c95e2686cf7ab46c2d0d6393aef15c4d62e8191e82fa364cc2835afcff88a02fe59bade123ba7747cfb78567a9069ee09d743dc8b848acdc9469e146f6113fb87ff194e7dc807d7c1836f32227ae7ea4dab8a4cec57185a70cdd20b859d3d77bb21312c6756818cb2ba630232d003a80be1ee4a5b1fd8a3505908849876a9af3716be2a364437225f1faa51aa126d4dd917dd4edcb523c5c610"], 0x8c, 0x0) fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000300)={{}, {}, [{0x2, 0x2, r3}, {0x2, 0x1, r4}, {0x2, 0x2, r5}, {0x2, 0x4, r6}, {0x2, 0x6, r7}], {}, [{0x8, 0x0, r9}, {0x8, 0x3}], {0x10, 0x8}, {0x20, 0x2}}, 0x5c, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:37 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff83000000110000000d60195a7088d701007ea85ca6576b9a992da4880348d1829ae697139777dd64ed1a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:37 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x6) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f00004af000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f0000000080)="c4c295b9e9260f32b9800000c00f3235002000000f300f01d1c4e2e9373df5ffffffb9300300000f3266f2670fbbeb0f33f0815b67f6ffffff0fc7b5f90f0000", 0x40}], 0x1, 0xf, &(0x7f0000000200), 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x1, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000340)={"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"}) r4 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:37 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x102002700) 07:43:37 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x9, 0x0, 0xff, 0x7, 0x0, 0x6, 0x60003, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8001, 0x2, @perf_bp={&(0x7f0000000040), 0xb}, 0x2008, 0xd17, 0x6, 0x8, 0x6, 0x0, 0x401}, 0x0, 0xd, 0xffffffffffffffff, 0x1) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x406, r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x100) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x34) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x1f, 0x63, 0xff, 0x0, 0x0, 0x3, 0x2120, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x9, 0x2, @perf_config_ext={0x100, 0x4}, 0x2104, 0x9, 0x7, 0x9, 0x8, 0x7, 0xf42}, r3, 0x2, 0xffffffffffffffff, 0x8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:37 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) bind(r0, &(0x7f0000000340)=@sco, 0x80) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27a90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d4c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27d000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7646b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) write(0xffffffffffffffff, &(0x7f0000000200)="04c008a26b90bdd761b41a5ec0bbf971a90c71a337f40c6e9cf4b326e807a8ef3f4e2689047b9891d28a662b318c4c233e6fc1a2ace80ca6ba28ab961792f5d8840e1a36c841d6dc830064da32d5205093afb096dde2b0aafb424132f1922bf98334f756823946b87c1b4fa9bd3fdef9bedd6c61d1ef69e45a9f5567a8d6f3a04286b05111bd7f2b9c139bb724eb498d9e3375cea075346910757485148ce23a1c5980d8301e361e1f25838a292f4cfc2cac1e1d89fab29ae00184b51a59830c2460b4c3fabad022140ca88fac93", 0xce) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ttyS3\x00', 0x12d040, 0x0) preadv(r2, &(0x7f0000000500)=[{&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/106, 0x6a}], 0x2, 0xffffffff, 0x0) 07:43:37 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x4c003, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv6_getmulticast={0x14, 0x3a, 0x10, 0x70bd29, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x2c00c850) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:37 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xb) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:37 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000040)={0xc, {0x8c, "00229b434198edc0baa78b59bc3ba4e539af31f739a39cb40c8ee5b617434e6310d2c72f152f2e5f6e86c04c7ad900a9b79a761950c2e2e8bb8f8d66363455799b6288d2ccb2d0ed2d3e6d0e87174683cf575a17c5c2aedb8ffee7afb05088f0b9374eb9e922eb04a530a739154f1a83deda122f01b39f850e0e4ff37196af0d639b9e2e7e7aae426d972184"}}, 0x92) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:37 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x1, 0x0, 0x0) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x40) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[r1, r4, r0]}, 0x3) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:37 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x0) 07:43:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5a2f8}, r2, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_SET_IRQCHIP(r4, 0x8208ae63, &(0x7f0000000200)={0x0, 0x0, @pic={0x3, 0x8, 0x8, 0x3b, 0x8, 0x0, 0x0, 0x0, 0x9, 0x40, 0x4, 0x7, 0x6, 0x80, 0x7f, 0xd9}}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r5 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r5, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:37 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x1, 0x81, 0x3f, 0x9, 0x0, 0x139a, 0x0, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x3, 0xfff}, 0x0, 0x1, 0x2, 0x7, 0xc34, 0x6, 0x79}, 0xffffffffffffffff, 0x2, r0, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f00000000c0)={0x3, 0xffffffffffffffff}) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x6, 0x8001, r2, &(0x7f0000000200)="89ccb29d90dffe88c30980ad2bf77fa03533f7a5128e5f7b4ca934af05bba62778cc8b9a36b9b8ae75b220d512f39ddca6dc", 0x32, 0xceaf, 0x0, 0x2, r0}, &(0x7f0000000280)) 07:43:37 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8e9ffffffffffff03000000030000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:37 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:37 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x0) 07:43:37 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000000280)={0x32, 0x2, 0x2, 0xff, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02']}, 0x18) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00', 0xffffffffffffffff) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="18000000", @ANYRES16=r3, @ANYBLOB="e51700000000000000001600000004000180986f1c3c9a86ed696587f65ba0871712fbdb14adee6f25b748a16b5b05e7251aba7391497c397ed13a24123b6882e3ace4049e1078a41dc6eba0adc690c04f25dd3eecf8de869f981dd06d3a1d1fabde6d46d127a052743efed806c236cc1eb8f9a6196da680fc7d9036045ed9837b8eb2aa532306839823593967a5b9d4dd17f7641cf86605b909cd0ed5d8005ea48cfe5a81c59b92a59721d92c38fee39be674cb763e1a0707d5773937c486f328b0aed9935fa36e6325b119bd236db0e6769960939d596b291b0bbf501c16715689b1c359489a"], 0x18}}, 0x0) io_setup(0x9, &(0x7f00000002c0)=0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x1, 0x0, 0x0) io_cancel(r4, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x5, 0x3, r5, &(0x7f0000000680)="d7e68bdde50ed71b783d54d8425f3c4e31c2", 0x12, 0x5, 0x0, 0x2, r0}, &(0x7f0000000700)) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000340)={0x224, r3, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x30, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0x134, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffff8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffff97}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfee0}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}]}]}, @TIPC_NLA_LINK={0x90, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}]}, 0x224}, 0x1, 0x0, 0x0, 0x4004004}, 0x0) 07:43:37 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) preadv(r1, &(0x7f0000000280)=[{&(0x7f0000000040)=""/151, 0x97}, {&(0x7f0000000200)=""/120, 0x78}], 0x2, 0x20, 0x0) r2 = openat$cgroup_subtree(r0, &(0x7f00000002c0)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f0000001340)={&(0x7f0000000340)=""/4096, 0x1000}) r3 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:37 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x4, 0x70, 0x1, 0x4, 0xc3, 0x2, 0x0, 0x7, 0x10000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x1, 0x7}, 0xc084, 0x3ff, 0xdac, 0x8, 0x1, 0xdb78, 0x28}, 0x0, 0xc, 0xffffffffffffffff, 0x2) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) preadv(r1, &(0x7f0000000680)=[{&(0x7f0000000240)=""/26, 0x1a}, {&(0x7f0000000280)=""/123, 0x7b}, {&(0x7f0000000340)=""/39, 0x27}, {&(0x7f0000000380)=""/8, 0x8}, {&(0x7f00000003c0)=""/90, 0x5a}, {&(0x7f0000000440)=""/161, 0xa1}, {&(0x7f0000000500)=""/70, 0x46}, {&(0x7f0000000580)=""/201, 0xc9}], 0x8, 0x997, 0x2) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8008, 0xa0, 0x3}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(0xffffffffffffffff, 0xae03, 0x4) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) write$binfmt_elf32(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:37 executing program 2: perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) clone(0xa1a48080, &(0x7f00000000c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="5204b9fd5643b393fc13b19b22ba4997e58ab2ba43eedc99266b2a9705631af8f0132f1f9cfbfb564da70929260d01249c39e6ea8b2bf48b8df5") execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x20001, &(0x7f0000000200)={[{@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@xino_auto='xino=auto'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}], [{@dont_measure='dont_measure'}, {@dont_hash='dont_hash'}, {@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}, {@obj_role={'obj_role', 0x3d, '^\xb5-+'}}, {@permit_directio='permit_directio'}]}) 07:43:37 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x16452d0) pwritev(r2, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x81001, 0x0) sendfile(r0, r2, 0x0, 0x0) 07:43:37 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0xb) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:37 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x2, 0xffffffffffffffff, 0x2) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x8000, &(0x7f0000000040)="3058efdb7d264bf69e5a8a21e911438cea4cc9f4a9b234f6e4f2a08ec7010ddf279f927aba46e2b2719829d38af726ae51e55179da", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)="a23b948bb76f27563206b423b83a167e2d8931889273ab83e7ef46e1b6e8d76a56dd280f7af7af612c5909f5171ae0f9ada0aecb4ac222cb9519ccd9c1d2a5c419037e852e641571d351ae2d73cbf67e7acce3d587cf1740df453ccb") r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x9, 0xffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)=0x0) clone(0x1000, &(0x7f0000000380)="c03e61296604306207bc52999aaf0d6a6151654cfc358537e60f57efdd6c35cfdc0cf2d4ffdf4d228bf3873e4d7d1546", &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="ab9a294bf770e412") perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x6, 0xed, 0x2, 0x3, 0x0, 0x4, 0x2a1a0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7ff, 0x0, @perf_config_ext={0x1, 0x86}, 0x8000, 0x0, 0x6, 0xd, 0x7, 0x8, 0x9}, r2, 0x7, 0xffffffffffffffff, 0x8) r3 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:37 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x88c2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) clone(0x508c2600, &(0x7f0000000200)="4e4ea0271c9f10911afa7677f37cd2e44c4ffa6f10a4dcb66a47a0b97e28bc3fb6040f8473fdb906791088a09a0425b7c5e990c89a4f5f748d61b72d46405a1478937abff969611f8ca57d5c259214e0596b38e9e1496bc44620468b03961f74d58dee35ea9f2f264d226fe6369028ee56046562e467210451c917ae8ef8f2835955794569bf85c70cbae31e537e9837d552292f16eb7b668b8f524972adc395df404badfb00db72e629510a40b8033738a0007cafe2b39ad3497e2f39", &(0x7f00000002c0), &(0x7f0000000340), &(0x7f0000000380)="aac44fdaa3b74b97112527ba009a5eda82bdbb9184cc28d8d7c02b9112b3a86865612eb06e9bf45cec9fc07a28a3f7d5e9b9c10b39a07c8e4673e0eea0abaa3b14b4904076597f27eed76fd07583c6aa02b333911ab733c55f91ff30b69ee5254512ae005d39811dd04d74b8e84aa6ac3e233722a944fd7e16") write$binfmt_elf32(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:37 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000300)={0xa, {0x8}}, 0xa) creat(&(0x7f0000000200)='./file0\x00', 0xa5) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000b80)=ANY=[@ANYBLOB="4832fb0a0a5a5d3e18dd9c787ae68db09efb03800c44c1d905a0d0e8cd8a89170e50e583a86c27301500de66493abb67bbb7cff0a1adde680b65642be21a88eea3e02c01a224ab5116d4b4293f7881a6ff1469fc269b735dc89178937eb57278b72cd07b6982bd858418a4155867b5b5ef0486d6f1ca40d3b0c6fb525fa7f4dcc2bfc1d911656500db00e49b0b153f39c2402908385acb5f88fde1f7282a1fcbb8bcdb9c55a8f930d7cd1f0d6c0e02efc021f7f30c1054af399491dcb233a9967d9eb15debf6260037c8d480295ae0708ae44c3b5d71df2ecac0f19364e8fc324e4200"/238], 0xd8) r3 = epoll_create1(0x0) ppoll(&(0x7f0000000040)=[{r0, 0x8000}, {r3, 0x3010}], 0x2, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)={[0x9]}, 0x8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r4 = syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x8, 0x101c40) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000780)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000001a40)={{}, 0x0, 0xa, @unused=[0x0, 0x0, 0x7ff], @devid=r5}) ioctl$BTRFS_IOC_GET_DEV_STATS(r1, 0xc4089434, &(0x7f0000000340)={r5, 0x2, 0x1, [0x91, 0xfffffffffffffff7, 0x0, 0x5, 0x20], [0x1000, 0x0, 0x4, 0x400, 0x2, 0x3, 0x7ff, 0xfffffffffffffca6, 0x1f, 0x1, 0x8, 0x9, 0x81, 0x3, 0x6, 0x9, 0xffff, 0xfffffffffffffffb, 0x326c, 0x6, 0xfffffffffffffffe, 0x6, 0x2, 0x20, 0x8, 0xec21, 0x80000000, 0x6, 0x38, 0x3, 0x65a, 0x6, 0x4, 0xfa, 0x400, 0x3, 0x3, 0x3ff, 0xeed, 0x7fffffff, 0x7, 0x3, 0x1, 0xfff, 0xc8d, 0x100, 0x2, 0x380000, 0x7, 0x7, 0xff, 0xe64, 0x0, 0x3fe, 0x1ff, 0x1, 0x5, 0xffffffffffffffff, 0x1f, 0x3, 0x1, 0xfffffffffffffffc, 0x100000000, 0x2, 0x401, 0x9, 0x2, 0x7, 0x1, 0x7f, 0x1be, 0x8, 0x9, 0x1f, 0xce1, 0x5, 0x8, 0x6e, 0x80000000, 0x7, 0x9, 0xffff, 0x79, 0x8000, 0xd05d, 0x52bfb5dc, 0x81, 0x2, 0x0, 0x2, 0x1161709e, 0x9, 0x1, 0x0, 0x4, 0x3, 0x4, 0x40000000000, 0x17, 0x0, 0x3, 0x8, 0x29, 0x8, 0x9, 0x100000000, 0x7ff, 0x8c2, 0x2, 0x1, 0x7, 0x2, 0x10000, 0x0, 0x6, 0x3, 0x8, 0x80000001, 0x401, 0x3, 0x3f]}) 07:43:37 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) r2 = syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x5, 0x6, &(0x7f00000006c0)=[{&(0x7f0000000240)="8334196b9b0ea5debb2230ea9b04ea4641b977c9e57e180bd14c66aea592d00c5f3f6882e5108f6af7fc51f7acbc461b85b4cbc8345db0a25729136411de759dddb9f8a13853b70a19e4daacbc8d54735ed91e7d1216d3271dcf5d9495db3e439c004898dac853910ff8d6c48a73316f17b88f530ac0dd2bb20bd59593ccc0adf922fd5a210d9b47115cb4ee34abcfc5b19407bfe6cdaee065d85cb81f81a3abdf0ee02d426ef14a8ab7f260e3521e5cfa30", 0xb2, 0xffffffff}, {&(0x7f0000000340)="cd28a319b388f8f6c29821482dfa4449605023219d274c08d965e2ef9bac80629b5be6f578a71bd3", 0x28, 0x7a5}, {&(0x7f0000000380)="0409d924c62c4afe990c4315e7e406b3a983db7fd37079ac9c0b293350bd1f653e44363e3c6404ab0be2a8ae96101fc26b6f9ea6587677d56612b9e6e807afd4720e6511eedcb42440bbb96742c734939beb9d6a", 0x54, 0x37}, {&(0x7f0000000400)="2157e0a9d79e4e9bb67b791053c1a6a5371d5680b1a808feeb77456682e54170dfde6d71f634c09d2e4dd0c40f408d932433547d133233e6c016ec24d197bb4f93510b6b88888f25aecc4572b169699baa68ba95e851e21ace51a3b39d973197cea010aae9e0efa3de3b3b5163ed6f3cbc019ba772771151c2480f1cf7c35d9d4d6891cd9bf9", 0x86, 0xffffffffffff9c70}, {&(0x7f00000004c0)="16013deff205dc34da27d4fd6c43ad941351ea0677ce4ebcb0c62ccb34efefff6d164ab68aeeabcaecea979d3a58a4f54b4802742cdad2557fcea9a1901233c40a3b01dc29dd7a7e8293036073d91dcee88c082d4fd8f70abeb72c493f2ed75ceae99f6dc90c3f6b6b8d381e9cde78638aa3199b10b1f1bf3f4d78fe922cd0a678545c5bd2670752891eee0ee4d68fd22140c7f2617fc7d0f65e725331a71e84713e7d56732920145d602f073cdf8bd0ef9a9999e6ffaef4739dc728c0cfb4a52f8009654188", 0xc6, 0x938}, {&(0x7f00000005c0)="0e09462a0097e06776dbba668e2c647b4eed85e0383cb9038ee273e645014675cd178a2fa0a4cc08ec47a9cf3232e135527b951c6c889665777a5772eea89a72e6c6ef84fac5c20189073ad6c8fccc15b7fdca1457fb902ba210b782264fd2518b7344e60d178c621281330d6325cd9964fc8a6c239c6a77c8fba3e5da7384e72cd9282932b6e060712eafe0d57479b4de04b049222d925979d35342eee52c60f4c2c434f5563d0577d14e0581e52b0c0d7e996f802b9e5c4b76ab4f4f4b36e4bd8b9b98366bb25d6cc69ca4f4f6523e91df6e4ad8f69d370917583c3956f3f780a38f4450dd4554191a964903131e6bdb38032aac1e", 0xf6, 0x1}], 0x100020, &(0x7f0000000780)={[{@test_dummy_encryption='test_dummy_encryption'}, {@noinit_itable='noinit_itable'}, {@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@data_ordered='data=ordered'}, {@stripe={'stripe', 0x3d, 0x86}}, {@journal_async_commit='journal_async_commit'}, {@stripe={'stripe'}}, {@dioread_nolock='dioread_nolock'}], [{@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fowner_eq={'fowner', 0x3d, 0xee01}}]}) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000880)={0x0, 0xffffffffffffffff, 0x8, 0x1, 0x7f00, 0x2}) getsockopt$sock_timeval(r0, 0x1, 0x43, &(0x7f0000000040), &(0x7f0000000080)=0x10) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:37 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) preadv(r1, &(0x7f0000000280)=[{&(0x7f0000000040)=""/183, 0xb7}, {&(0x7f0000000200)=""/127, 0x7f}, {&(0x7f0000000340)=""/135, 0x87}], 0x3, 0xffff, 0xffffff0c) 07:43:37 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000880)='/dev/bsg\x00', 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4, 0x7f}, 0x0, 0x0, r0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x4000000, &(0x7f0000000040)="3c22f59fbe0c4b7afcf69d89cfb9f0045685c1d3b87061e38668f5d245dd90ed98367d1296e29dbdf4a7066a312bf3c33a44830df7af370f0dbeac0cc13073c8d5d60b1d4637f0b0a49d247310e677e944921850b343829926fd2f2b9691c63e9a20cd27c7b908cbe1eb", &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240)="9061f0176ce4de3857986ca7d92a296931e9cdaa6747131951dcea05699b5d8c242fa71f9018f57fc70878ca66eb420d3e70c205ed227723561e0803b734d4cfe98661b3a3020d87365918121ba1727d7b699077eb34eb72155e67fa42637d0b553fd1784a7b94702e1a22295b2c31b2d301dec328907a4885d491ad130a61782e12932ab52e8d9ead53d07f4b84d7e754f9d1f5d31c4c") preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f00000ba000/0x1000)=nil, 0x1000, 0x1000000, 0x4000010, r1, 0x8000000) r3 = syz_io_uring_complete(r2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x4a8, 0xffffffff, 0x2f8, 0x0, 0x2f8, 0xffffffff, 0xffffffff, 0x410, 0x410, 0x410, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0x1d0, 0x1f8, 0x0, {}, [@common=@set={{0x40, 'set\x00'}, {{0x0, [0x1, 0x3, 0x4, 0x4, 0x1], 0x2, 0x5}}}, @common=@unspec=@comment={{0x120, 'comment\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x38}, @remote, 0xffffffff, 0xffff00, 'veth0_to_team\x00', 'erspan0\x00', {}, {}, 0x8, 0x3, 0x5c}, 0x0, 0xc0, 0x100, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x10, 0x104, 0x0, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x20, 0x0, "795f1376942c97942d7b1048ef0d34bd9800f63dd7f2403d5e4446e76322"}}}, {{@ip={@broadcast, @multicast2, 0xff000000, 0xff000000, 'ipvlan0\x00', 'veth0_to_bridge\x00', {}, {0xff}, 0x2, 0x1, 0x10}, 0x0, 0xe8, 0x118, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x1, 0x53}}, @common=@osf={{0x50, 'osf\x00'}, {'syz0\x00', 0x0, 0x8, 0x1}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0xffffffffffffffff, 0x5, 0x4}, {0x4, 0x5, 0x2}, 0x3ff, 0x7}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x508) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) clone(0x800000, &(0x7f0000000980)="498e2b8ceed1f06b2692ce6af1925e1dd5ac15741d8a43e7fffb93afd5475f4223d50ff84286ffe888cc59b7700aa3b6290e82e5294e5241db91a288489f9b853bbe7566bcef28ee56df7b53255212ebd61d3724965482b6d78afebbf8433a1b757625da9d9096630a0468acf4a91fbb529073194b278ce9c6d54d66f753a949ac319cb2c8995ec835c5d8d093b5793b05b23ba5ce4da760f345a4e921bb3db6932839b563e4bc2cb55df48bbf85911ff3af78d48fbf6fdf9e2224e0f18ad57adebada447d2c59a69121384203de5ded9240c7fb52d97c14322d9b313427d6518a01ee968d8ccd71ad1e94d3", &(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)="46c9615c017fcd625c552d4fe191749aba7622e2e145616c85d7b3bd5cec21675ad61a99238f896b1dcfa65d31cfbd611c9379979878e421c434ab835894a189623b2a459dada513c2ff1f4c8a3d664adee03a2e87dc9d4e038774e54f2f39ea1d7b1c01e544ec3fb824d9b5b5abdeb748cb4c60499be5ca382f579f36f41b1c06a348fa25f9d8ea18c57daf0ebd1a913ad630171d63f874e21bb3e8d8806388d9a9be815a613dc2b7496a4d302d7f418a533d6c772fbf31bec37088c0ae7e6783") r4 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r5 = openat$cgroup_ro(r0, &(0x7f00000008c0)='memory.swap.current\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000900)={0x0, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e21, @remote}, 0x0, 0x0, 0x0, 0x0, 0x1ef9, 0x0, 0xffffffffffffffd9}) openat$incfs(r5, &(0x7f0000000c00)='.pending_reads\x00', 0x40081, 0x4) 07:43:37 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000000280)={0x32, 0x2, 0x2, 0xff, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02']}, 0x18) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00', 0xffffffffffffffff) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="18000000", @ANYRES16=r3, @ANYBLOB="e51700000000000000001600000004000180986f1c3c9a86ed696587f65ba0871712fbdb14adee6f25b748a16b5b05e7251aba7391497c397ed13a24123b6882e3ace4049e1078a41dc6eba0adc690c04f25dd3eecf8de869f981dd06d3a1d1fabde6d46d127a052743efed806c236cc1eb8f9a6196da680fc7d9036045ed9837b8eb2aa532306839823593967a5b9d4dd17f7641cf86605b909cd0ed5d8005ea48cfe5a81c59b92a59721d92c38fee39be674cb763e1a0707d5773937c486f328b0aed9935fa36e6325b119bd236db0e6769960939d596b291b0bbf501c16715689b1c359489a"], 0x18}}, 0x0) io_setup(0x9, &(0x7f00000002c0)=0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x1, 0x0, 0x0) io_cancel(r4, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x5, 0x3, r5, &(0x7f0000000680)="d7e68bdde50ed71b783d54d8425f3c4e31c2", 0x12, 0x5, 0x0, 0x2, r0}, &(0x7f0000000700)) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000340)={0x224, r3, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x30, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0x134, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffff8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffff97}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfee0}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}]}]}, @TIPC_NLA_LINK={0x90, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}]}, 0x224}, 0x1, 0x0, 0x0, 0x4004004}, 0x0) 07:43:37 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r2 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000540)=ANY=[]) fstatfs(r2, &(0x7f0000000200)=""/131) r3 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000540)=ANY=[]) fstatfs(r3, &(0x7f0000000200)=""/131) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x1, 0x0, 0x0) r5 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000540)=ANY=[]) fstatfs(r5, &(0x7f0000000200)=""/131) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRESHEX=r2, @ANYRESHEX, @ANYRES64=r3, @ANYRES16=r0, @ANYRESHEX=r3, @ANYRES64, @ANYRES16, @ANYRES16=r5], 0xd8) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:37 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000003000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:37 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$mouse(&(0x7f0000000400)='/dev/input/mouse#\x00', 0x6, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x1, 0x7, 0x5, 0x4d, 0x0, 0x2, 0x50424, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9e15, 0x0, @perf_config_ext={0x100000001, 0x3}, 0x8100, 0x2, 0xff, 0x0, 0x7, 0x3e5d9527, 0x3}, 0x0, 0x8, r0, 0x1) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x400000, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x1200, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8) r4 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000c, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000002c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000540)=ANY=[]) fstatfs(r4, &(0x7f0000000200)=""/131) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000080)='.\x00', 0x0, r4) r5 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r5, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:37 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000340)={{r0}, 0x0, 0x1c, @unused=[0x0, 0x6, 0x0, 0xfffffffffffffff7], @subvolid=0x100000000}) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/ip_mr_vif\x00') r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x131502, 0x0) write$UHID_INPUT2(r2, &(0x7f0000001340)={0xc, {0x7d, "874e5dcd4c53d9b3d00541732aee87da32856296a18e2387e66bbcd5829b7b8ce138bac4e331a96923ae7e79803ee3478ba04edd0129aeac18660eaf80c174ed0d3e226c6716a7a43fef609bd3c3bc6e1eaa4ac677af18b92057b02ec54dde3c29877d41a54b398f23b58dbd212e45272211b3077226392d612354acf3"}}, 0x83) fcntl$setlease(r3, 0x400, 0x0) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f0000000280)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0, r1) r4 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000871adc841ab003b4c21def6de0b73800000057003510c38422a3bc8220000500000004c4d88a0c000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffff5c090000000000000d60395a7088d7b37f000000a9030001007ea85ca6576b9a996da4880348d1829ae69700"], 0xd8) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:37 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x25022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) splice(r1, &(0x7f0000000080)=0x1, r2, &(0x7f00000000c0), 0x64c0d332, 0x2) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r3 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) sendfile(r1, r0, &(0x7f0000000040)=0x9, 0x40) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:37 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x70, 0x80, 0x81, 0x4, 0x7f, 0x0, 0x8, 0x32010, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5f01, 0x4, @perf_config_ext={0x1000, 0x8}, 0x50280, 0x1600, 0x7c3d, 0x6, 0x53a4, 0x4, 0x6}, r0, 0xb, r1, 0x1) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:37 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(0x0, 0x33) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 121.435004][ T4728] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:43:38 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:38 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000540)=ANY=[]) fstatfs(r2, &(0x7f0000000200)=""/131) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f00000002c0)=0x5) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) open(&(0x7f0000000340)='./file0\x00', 0x4200, 0x122) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000240)=[r1, r4, r0, r1], 0x4) r5 = memfd_create(&(0x7f0000000500)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[\x83\xcd\t\x88@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae!\xfc\xc4\x8fr^\xef\xcd\xb7\xbb\"\f\xa0\xd0\xd3\x0f\xd42\xb8\xd9\xa0o\x1c\xabJP2\xb2\xc3g\a\xa1+\xdc\xfe\xed\x1b!\xee\x92\xba\xc1y\xf6\xa6\xc7&@\xc4\x18\xf3E\xe7&R\x05\x11\xbb\xc9\fRjoO\x04I\xb9\f8\b\xfb\xfc\x8d\x02O\xfcO \x145\xactQ/RH\x84\xa1\xc8XW\xd71N_ \x15F,\xea[jI\x1d\xc5t_J\x92\xdb\x1dA\x94\xc6u7\xf4\x8f\xaf\x02+rH\x0f\x19TeS\xc8J}B\xac\x0f$%\x10u\xf2\x0e\xcb\x0f\xac~\xdf$\xa3\xf5b\x1a\xe9\x05\xe7\x05\xe6\x8bO\x9c6\x1dL\x1fN\xfd\b\x00\xa1SK{\xb9\xeaY\x94f*$\xb5\x9a\xe3\x98\xb4Q\xdb\x06\xa3\xcflQ~\xcei\xe1\xfe\xc6/\xaf\xa9\x91\xae\x1e \xd94\x04\xa7.\xda\xcfZ=\xab\xfd\x0eQ\xcc\x19\xcaZk\x89\xab\x9b\x90\xa5\xe5\x84\v\xb2\xbc\xa4\xa9f\xdc\xed\x02a\xf6N\xb9\xf6/\x84\xf2q\x00'/373, 0x0) write$binfmt_elf32(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r5, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x1100) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000380)={0xc, {0x49, "d5b4d83d2524ada35a45b8bec64290c5a2c6d62ad254de53103d18b4cee16111c8f08bcc58f1de55ded93c0fa644b3f781c7ec98fe62ba85d26a1383cb5c0f7143117295781ac76fa5"}}, 0x4f) 07:43:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:38 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000880)='/dev/bsg\x00', 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4, 0x7f}, 0x0, 0x0, r0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x4000000, &(0x7f0000000040)="3c22f59fbe0c4b7afcf69d89cfb9f0045685c1d3b87061e38668f5d245dd90ed98367d1296e29dbdf4a7066a312bf3c33a44830df7af370f0dbeac0cc13073c8d5d60b1d4637f0b0a49d247310e677e944921850b343829926fd2f2b9691c63e9a20cd27c7b908cbe1eb", &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240)="9061f0176ce4de3857986ca7d92a296931e9cdaa6747131951dcea05699b5d8c242fa71f9018f57fc70878ca66eb420d3e70c205ed227723561e0803b734d4cfe98661b3a3020d87365918121ba1727d7b699077eb34eb72155e67fa42637d0b553fd1784a7b94702e1a22295b2c31b2d301dec328907a4885d491ad130a61782e12932ab52e8d9ead53d07f4b84d7e754f9d1f5d31c4c") preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f00000ba000/0x1000)=nil, 0x1000, 0x1000000, 0x4000010, r1, 0x8000000) r3 = syz_io_uring_complete(r2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x4a8, 0xffffffff, 0x2f8, 0x0, 0x2f8, 0xffffffff, 0xffffffff, 0x410, 0x410, 0x410, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0x1d0, 0x1f8, 0x0, {}, [@common=@set={{0x40, 'set\x00'}, {{0x0, [0x1, 0x3, 0x4, 0x4, 0x1], 0x2, 0x5}}}, @common=@unspec=@comment={{0x120, 'comment\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x38}, @remote, 0xffffffff, 0xffff00, 'veth0_to_team\x00', 'erspan0\x00', {}, {}, 0x8, 0x3, 0x5c}, 0x0, 0xc0, 0x100, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x10, 0x104, 0x0, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x20, 0x0, "795f1376942c97942d7b1048ef0d34bd9800f63dd7f2403d5e4446e76322"}}}, {{@ip={@broadcast, @multicast2, 0xff000000, 0xff000000, 'ipvlan0\x00', 'veth0_to_bridge\x00', {}, {0xff}, 0x2, 0x1, 0x10}, 0x0, 0xe8, 0x118, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x1, 0x53}}, @common=@osf={{0x50, 'osf\x00'}, {'syz0\x00', 0x0, 0x8, 0x1}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0xffffffffffffffff, 0x5, 0x4}, {0x4, 0x5, 0x2}, 0x3ff, 0x7}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x508) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) clone(0x800000, &(0x7f0000000980)="498e2b8ceed1f06b2692ce6af1925e1dd5ac15741d8a43e7fffb93afd5475f4223d50ff84286ffe888cc59b7700aa3b6290e82e5294e5241db91a288489f9b853bbe7566bcef28ee56df7b53255212ebd61d3724965482b6d78afebbf8433a1b757625da9d9096630a0468acf4a91fbb529073194b278ce9c6d54d66f753a949ac319cb2c8995ec835c5d8d093b5793b05b23ba5ce4da760f345a4e921bb3db6932839b563e4bc2cb55df48bbf85911ff3af78d48fbf6fdf9e2224e0f18ad57adebada447d2c59a69121384203de5ded9240c7fb52d97c14322d9b313427d6518a01ee968d8ccd71ad1e94d3", &(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)="46c9615c017fcd625c552d4fe191749aba7622e2e145616c85d7b3bd5cec21675ad61a99238f896b1dcfa65d31cfbd611c9379979878e421c434ab835894a189623b2a459dada513c2ff1f4c8a3d664adee03a2e87dc9d4e038774e54f2f39ea1d7b1c01e544ec3fb824d9b5b5abdeb748cb4c60499be5ca382f579f36f41b1c06a348fa25f9d8ea18c57daf0ebd1a913ad630171d63f874e21bb3e8d8806388d9a9be815a613dc2b7496a4d302d7f418a533d6c772fbf31bec37088c0ae7e6783") r4 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r5 = openat$cgroup_ro(r0, &(0x7f00000008c0)='memory.swap.current\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000900)={0x0, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e21, @remote}, 0x0, 0x0, 0x0, 0x0, 0x1ef9, 0x0, 0xffffffffffffffd9}) openat$incfs(r5, &(0x7f0000000c00)='.pending_reads\x00', 0x40081, 0x4) 07:43:38 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x8, 0xf7, 0x8, 0x5, 0x0, 0x3, 0xfa404, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6bb, 0x0, @perf_config_ext={0x10001, 0x6}, 0x10, 0xc9, 0x3, 0x4, 0x6, 0xffff, 0x4}, 0x0, 0x3, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:38 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000003c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xb) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000200)="867dc7fa4ae960f8c60e4908ac6bf42672733882282ddf3bb55d515bf283e30c1592a25537895b4ebcb1ca896e53de6d7c004ae26b98ae4e14762e771f644185cf8574bcab0d9127e2ae07938d5af5449a68c81b4ed495ac3060b01833b0013580f184c4db45e43e29671d155771047f60e92509c061894e8167efc9468918d9230f0c1187d5ffc667a4e447de70395d87ee1c720b23eebe7dfc926ea0e4e740b348cd2fc91fd74ed93d", 0xaa}, {&(0x7f0000000340)="b9be948a011eb1d7b93cdeffd0419d986206b8ed7a5598780cd9f7a7a16a775f6fd84b8153b9d1c3e21688f064be772ce7239a97ec8edf03a2b82d69223acedaa9bfe5d620ac1f87b276b151b6185e122d0f703e0e6c67bff2cba870364b837b10037ddbeed637970e63597c7558d7acb6e7a7cfb53fb1b2eb800713754d2a6c31619584c60e1370110c7871bc25baef1272ec72e5d3160e3b131863d1cfc35cb1ddd403849e00435721e463bd1588196994ab349fef", 0xb6}], 0x2, 0xc) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="61a24511a601d8a83df01738bda9233f00e143acd4ca32c214b4b55846df45fcb0af27118a46c2452d"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:38 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="7f1b789df8118d6f21d48e7dbe52de2b1abf46d885a211fea7119a2f1f6f4e590e49996aa8c0c1d501805f39062f4f7974f4d8c80154c3502a38342f61bdafa38d46fa2d51dae28542b69d342afb8bc710dff7dde30942f37b20c0db638f6e45d17d1678c1741638242bb9011ab69997f9bc7af0a70651408a99c06a9cff169484ad639ba7189ebc107099152fe2"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:38 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24023, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="0d8f061f6c2118ccec54cbc6ae524e865ae7bb709b96e9e6328f6796e4b3ba0d00d92e3e8c827dc6f068415f05f6694b32f57869079b96b6f857b1dea5c8514caa310d92e6c433e514c7a8fe"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:38 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x9, 0x20, 0x8, 0x9, 0x0, 0x8, 0x1662, 0xd, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0xd}, 0x800, 0x1, 0x1, 0x4, 0xc1, 0x5, 0x6}, r1, 0xb, r0, 0x3) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4018aebd, &(0x7f0000000200)={0x4, r3}) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r4 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:38 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = signalfd(r0, &(0x7f0000000080)={[0x272]}, 0x8) r2 = openat(r1, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r2, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r3 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:38 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000880)='/dev/bsg\x00', 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4, 0x7f}, 0x0, 0x0, r0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x4000000, &(0x7f0000000040)="3c22f59fbe0c4b7afcf69d89cfb9f0045685c1d3b87061e38668f5d245dd90ed98367d1296e29dbdf4a7066a312bf3c33a44830df7af370f0dbeac0cc13073c8d5d60b1d4637f0b0a49d247310e677e944921850b343829926fd2f2b9691c63e9a20cd27c7b908cbe1eb", &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240)="9061f0176ce4de3857986ca7d92a296931e9cdaa6747131951dcea05699b5d8c242fa71f9018f57fc70878ca66eb420d3e70c205ed227723561e0803b734d4cfe98661b3a3020d87365918121ba1727d7b699077eb34eb72155e67fa42637d0b553fd1784a7b94702e1a22295b2c31b2d301dec328907a4885d491ad130a61782e12932ab52e8d9ead53d07f4b84d7e754f9d1f5d31c4c") preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f00000ba000/0x1000)=nil, 0x1000, 0x1000000, 0x4000010, r1, 0x8000000) r3 = syz_io_uring_complete(r2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x4a8, 0xffffffff, 0x2f8, 0x0, 0x2f8, 0xffffffff, 0xffffffff, 0x410, 0x410, 0x410, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0x1d0, 0x1f8, 0x0, {}, [@common=@set={{0x40, 'set\x00'}, {{0x0, [0x1, 0x3, 0x4, 0x4, 0x1], 0x2, 0x5}}}, @common=@unspec=@comment={{0x120, 'comment\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x38}, @remote, 0xffffffff, 0xffff00, 'veth0_to_team\x00', 'erspan0\x00', {}, {}, 0x8, 0x3, 0x5c}, 0x0, 0xc0, 0x100, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x10, 0x104, 0x0, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x20, 0x0, "795f1376942c97942d7b1048ef0d34bd9800f63dd7f2403d5e4446e76322"}}}, {{@ip={@broadcast, @multicast2, 0xff000000, 0xff000000, 'ipvlan0\x00', 'veth0_to_bridge\x00', {}, {0xff}, 0x2, 0x1, 0x10}, 0x0, 0xe8, 0x118, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x1, 0x53}}, @common=@osf={{0x50, 'osf\x00'}, {'syz0\x00', 0x0, 0x8, 0x1}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0xffffffffffffffff, 0x5, 0x4}, {0x4, 0x5, 0x2}, 0x3ff, 0x7}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x508) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) clone(0x800000, &(0x7f0000000980)="498e2b8ceed1f06b2692ce6af1925e1dd5ac15741d8a43e7fffb93afd5475f4223d50ff84286ffe888cc59b7700aa3b6290e82e5294e5241db91a288489f9b853bbe7566bcef28ee56df7b53255212ebd61d3724965482b6d78afebbf8433a1b757625da9d9096630a0468acf4a91fbb529073194b278ce9c6d54d66f753a949ac319cb2c8995ec835c5d8d093b5793b05b23ba5ce4da760f345a4e921bb3db6932839b563e4bc2cb55df48bbf85911ff3af78d48fbf6fdf9e2224e0f18ad57adebada447d2c59a69121384203de5ded9240c7fb52d97c14322d9b313427d6518a01ee968d8ccd71ad1e94d3", &(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)="46c9615c017fcd625c552d4fe191749aba7622e2e145616c85d7b3bd5cec21675ad61a99238f896b1dcfa65d31cfbd611c9379979878e421c434ab835894a189623b2a459dada513c2ff1f4c8a3d664adee03a2e87dc9d4e038774e54f2f39ea1d7b1c01e544ec3fb824d9b5b5abdeb748cb4c60499be5ca382f579f36f41b1c06a348fa25f9d8ea18c57daf0ebd1a913ad630171d63f874e21bb3e8d8806388d9a9be815a613dc2b7496a4d302d7f418a533d6c772fbf31bec37088c0ae7e6783") r4 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r5 = openat$cgroup_ro(r0, &(0x7f00000008c0)='memory.swap.current\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000900)={0x0, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e21, @remote}, 0x0, 0x0, 0x0, 0x0, 0x1ef9, 0x0, 0xffffffffffffffd9}) openat$incfs(r5, &(0x7f0000000c00)='.pending_reads\x00', 0x40081, 0x4) 07:43:38 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x4) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x1, 0x0, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) r5 = socket$xdp(0x2c, 0x3, 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f00000002c0)=[r3, r1, r2, r4, 0xffffffffffffffff, r5], 0x6) write$binfmt_elf32(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r0, 0x4008941a, &(0x7f0000000200)) 07:43:38 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000540)=ANY=[]) fstatfs(r2, &(0x7f0000000200)=""/131) r3 = signalfd(r2, &(0x7f0000000040)={[0xc912]}, 0x8) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000480)={0x10001, 0x0, 0x100000001, 0x100, 0x5, 0x1}) r5 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f00000002c0)="748edb07e7228b47c478665f86d46b7281fde8313c036c1d173f7e29ba2593e15116df16d5b17c3b7b010a5986fbc767ea94220cf9ad5f1401d9970b54be7117233d81462a4d558edbf8be79e6c5712b862b443ff00f5221eabe1411f31a10c05db5c6fadcc491f1182999e3a99011c77b1f8d0e93c9859ecf014a87bccd7a85733e9b", 0x83}, {&(0x7f0000000380)="e875b4ecb8309a54e859f9249c5aff3d8cceb42a09b1b3a1d4590960ff7a644164bf345988f09df67b2b883a7f270482182fd2bd764f1f2d49070fc4413185e041ce15f0c30a06540c7360fd00b58c1ed443163246d8da2418d1baca6f9fa0ed734577838fb98a1295dc0571e9e4abefb35da52d9b17b7ea287b896e52a3c0d469c8569b958f8504ed16b5a153b55861d7bc9b652c116630bc5fe78cd701c806ab62717b691343566879f79673fca92a83f9fc34bbcd03858644bf30eabcab0a94131d7a45bc4bf48e6da7c61dd75ce3608ee1dd2142cc18cacbd09b", 0xdc}], 0x2) execveat(r5, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) setreuid(0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000002800)={0x0, 0x0, 0x0}, &(0x7f0000002840)=0xc) statx(0xffffffffffffffff, &(0x7f0000002900)='./file0\x00', 0x100, 0x8, &(0x7f0000002940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000002cc0)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000002dc0)=0xe8) syz_fuse_handle_req(r4, &(0x7f0000000500)="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", 0x2000, &(0x7f0000002f00)={&(0x7f0000002500)={0x50, 0xffffffffffffffda, 0x552, {0x7, 0x21, 0x2, 0x81002, 0x7, 0x800, 0x4, 0x3}}, &(0x7f0000002580)={0x18, 0x0, 0x3, {0x2}}, &(0x7f00000025c0)={0x18, 0x24, 0x9, {0x1}}, &(0x7f0000002600)={0x18, 0x0, 0x6, {0xc12}}, &(0x7f0000002640)={0x18, 0x0, 0x6, {0x9}}, &(0x7f0000002680)={0x28, 0xffffffffffffffda, 0xfffffffffffffff9, {{0x9, 0x1, 0x1, 0xffffffffffffffff}}}, &(0x7f00000026c0)={0x60, 0xfffffffffffffffe, 0x8, {{0x2, 0x4, 0x25e, 0x5, 0xff, 0x22d, 0xb38, 0xffc00000}}}, &(0x7f0000002740)={0x18, 0x0, 0xb34, {0xfff}}, &(0x7f0000002780)={0x11, 0x0, 0xf0e, {'\x00'}}, &(0x7f00000027c0)={0x20, 0x0, 0x4, {0x0, 0x2}}, &(0x7f0000002880)={0x78, 0x0, 0x2, {0x31, 0x9, 0x0, {0x4, 0x40, 0x9, 0x40000000000, 0x2, 0x9, 0x101, 0x101, 0x2c3, 0xc000, 0xb3b, 0x0, r6, 0xffff, 0x7}}}, &(0x7f0000002a40)={0x90, 0x0, 0x200, {0x2, 0x3, 0x10001, 0x1, 0x39, 0x9, {0x5, 0x4, 0x100, 0x1f, 0x1, 0x400, 0x8001, 0x9, 0x7fffffff, 0xc000, 0x800, 0xee00, r7, 0x5, 0x8}}}, &(0x7f0000002b00)={0xc8, 0x0, 0x9, [{0x5, 0x3c, 0x71, 0x8001, '\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8'}, {0x1, 0x80000000, 0xe, 0x7, '-*\'\'*%}%-^*-*{'}]}, &(0x7f0000002c00)={0xb0, 0xffffffffffffffda, 0x3, [{{0x5, 0x0, 0xb1, 0x7fff, 0x148b, 0x3, {0x5, 0x54, 0xffffffff, 0x0, 0x9, 0x9, 0x7, 0x3, 0x61, 0x4000, 0x6, r8, 0x0, 0x0, 0x4}}, {0x0, 0xf10, 0x4, 0x6, '\xe5)\xdb#'}}]}, &(0x7f0000002e00)={0xa0, 0x0, 0x9, {{0x3, 0x0, 0x5, 0x2, 0x0, 0xfffffbff, {0x2, 0x3, 0xffff, 0xffffffffffffffff, 0x1, 0x8001, 0xaf, 0xf17, 0x7ff, 0x0, 0x401, r9, 0xffffffffffffffff, 0x2, 0x4}}, {0x0, 0xc}}}, &(0x7f0000002ec0)={0x20, 0x0, 0x1000, {0x400, 0x4, 0x8001, 0x3}}}) 07:43:38 executing program 4: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000080)=r0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0xc000, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:38 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b903000600000000000011f4b73800ab000057003510aa8422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60385a7088d7c27f000000a9030001007ea85ca6576b9a992da4882148d1829ae697139777df64e81a1ac4bc7671b83d5d3addb19d25bae798feb2174036a10b8dfe0749"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:38 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000040)=""/89, 0x59}, {&(0x7f0000000340)=""/132, 0x84}, {&(0x7f0000000400)=""/114, 0x72}, {&(0x7f00000000c0)=""/11, 0xb}], 0x4, 0x0, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) r3 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="16d470fffe7040a2b86983ab90fa1844790ebb98971bd29789085e1a598269135dd54e73bb4030bac77b047829e349826a2af6517cf82a00000000000000000000824145ff3a589cdf5491958ccd29ae59c6ffc5dd570d1f62df8d97930304836e6f6a5adbd202e00cc4c86d72bd5b01898df69726669105c9536c97b92f7feb508e17dbf19fcfcbe3717f3a832a2998"], 0xd8) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:38 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) r1 = socket$nl_generic(0x10, 0x3, 0x10) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000040)="a94839ae3fb6d83cddda8e62308e67c3bec4ce166cc7eccb1f156bf5a91095b77b5bd0b5d3c5985c2be224014ad6", 0x2e}, {&(0x7f0000000200)="d69ce9d078ed8052a9ad337a3be06b27ed2fc12b1ac62e6944876fd37965955e123cf1913f2206e21390b6baa475ddbab0dabc6d353dbd103ca1bf50eec70fc742cb5f1752b037ff745576553022024d8d6e3dd0ebf7fa3be0fe4c5fd99cfc15a27404da84ed5680b7df47667c4ac28fd6bf8dc78218d3589a97d0e2e149562f841493592bead47aab57383d0e11a41dc2681a4db1b21feaea5f8ce4893498a9c563cbc79eb8aa10b4fe14c53202c43441a9b26166cf911ac519faec5e11b3aeea0d9ad0a2ad585b4a7c907bbf500437ba04bfe595d087f1060d3e7c11c99c53401effa08f7b9b1523e4649a", 0xec}, {&(0x7f0000000340)="09d07b40f273054ede1adb8a3f0c660712d30ec17a73fde9001e01e389c6e52a9be231ff4129d33d6c553639c75bd570b4f6b2f956ffb783dbd22797f792db12a990cece2392d9dad5a8b3bef08200e7464dc1c30c46c21466ca1c19a72e6cf59f936078e7000c5f0a052af2d996f2c56a24f6c551c744d341f7bae5446e83d90f98dbef3aa3d9d7b72a41a34a2f3504ba1dcd4a9ec0c107b79ed96444407589d6efab9174581d83", 0xa8}], 0x3, 0x3) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:38 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000880)='/dev/bsg\x00', 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4, 0x7f}, 0x0, 0x0, r0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x4000000, &(0x7f0000000040)="3c22f59fbe0c4b7afcf69d89cfb9f0045685c1d3b87061e38668f5d245dd90ed98367d1296e29dbdf4a7066a312bf3c33a44830df7af370f0dbeac0cc13073c8d5d60b1d4637f0b0a49d247310e677e944921850b343829926fd2f2b9691c63e9a20cd27c7b908cbe1eb", &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240)="9061f0176ce4de3857986ca7d92a296931e9cdaa6747131951dcea05699b5d8c242fa71f9018f57fc70878ca66eb420d3e70c205ed227723561e0803b734d4cfe98661b3a3020d87365918121ba1727d7b699077eb34eb72155e67fa42637d0b553fd1784a7b94702e1a22295b2c31b2d301dec328907a4885d491ad130a61782e12932ab52e8d9ead53d07f4b84d7e754f9d1f5d31c4c") preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f00000ba000/0x1000)=nil, 0x1000, 0x1000000, 0x4000010, r1, 0x8000000) r3 = syz_io_uring_complete(r2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x4a8, 0xffffffff, 0x2f8, 0x0, 0x2f8, 0xffffffff, 0xffffffff, 0x410, 0x410, 0x410, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0x1d0, 0x1f8, 0x0, {}, [@common=@set={{0x40, 'set\x00'}, {{0x0, [0x1, 0x3, 0x4, 0x4, 0x1], 0x2, 0x5}}}, @common=@unspec=@comment={{0x120, 'comment\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x38}, @remote, 0xffffffff, 0xffff00, 'veth0_to_team\x00', 'erspan0\x00', {}, {}, 0x8, 0x3, 0x5c}, 0x0, 0xc0, 0x100, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x10, 0x104, 0x0, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x20, 0x0, "795f1376942c97942d7b1048ef0d34bd9800f63dd7f2403d5e4446e76322"}}}, {{@ip={@broadcast, @multicast2, 0xff000000, 0xff000000, 'ipvlan0\x00', 'veth0_to_bridge\x00', {}, {0xff}, 0x2, 0x1, 0x10}, 0x0, 0xe8, 0x118, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x1, 0x53}}, @common=@osf={{0x50, 'osf\x00'}, {'syz0\x00', 0x0, 0x8, 0x1}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0xffffffffffffffff, 0x5, 0x4}, {0x4, 0x5, 0x2}, 0x3ff, 0x7}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x508) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) clone(0x800000, &(0x7f0000000980)="498e2b8ceed1f06b2692ce6af1925e1dd5ac15741d8a43e7fffb93afd5475f4223d50ff84286ffe888cc59b7700aa3b6290e82e5294e5241db91a288489f9b853bbe7566bcef28ee56df7b53255212ebd61d3724965482b6d78afebbf8433a1b757625da9d9096630a0468acf4a91fbb529073194b278ce9c6d54d66f753a949ac319cb2c8995ec835c5d8d093b5793b05b23ba5ce4da760f345a4e921bb3db6932839b563e4bc2cb55df48bbf85911ff3af78d48fbf6fdf9e2224e0f18ad57adebada447d2c59a69121384203de5ded9240c7fb52d97c14322d9b313427d6518a01ee968d8ccd71ad1e94d3", &(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)="46c9615c017fcd625c552d4fe191749aba7622e2e145616c85d7b3bd5cec21675ad61a99238f896b1dcfa65d31cfbd611c9379979878e421c434ab835894a189623b2a459dada513c2ff1f4c8a3d664adee03a2e87dc9d4e038774e54f2f39ea1d7b1c01e544ec3fb824d9b5b5abdeb748cb4c60499be5ca382f579f36f41b1c06a348fa25f9d8ea18c57daf0ebd1a913ad630171d63f874e21bb3e8d8806388d9a9be815a613dc2b7496a4d302d7f418a533d6c772fbf31bec37088c0ae7e6783") r4 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r5 = openat$cgroup_ro(r0, &(0x7f00000008c0)='memory.swap.current\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000900)={0x0, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e21, @remote}, 0x0, 0x0, 0x0, 0x0, 0x1ef9, 0x0, 0xffffffffffffffd9}) openat$incfs(r5, &(0x7f0000000c00)='.pending_reads\x00', 0x40081, 0x4) 07:43:38 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$inet(r0, &(0x7f0000000200)="6b025f3e1fc738cf997fdc05346038361cb26cfdafd0614b761480d372b7d7e7ff1d533fc6b7743c514e4afe44401a545fc404fa1246aa9d3a16d8f37c6d07fcb735332c183b0a14d5cced34b882628caaee69bba30d2aa3dd23e816ffd49ae477282d25b2b653bf69a8ccc776690671798753406e46e84ebe849899aa8b99e4e5fd6251003b8a9b0ba437943f2e174e8d4db7b4c81f090177c9753bed1bd41d02d943abbf4891d762d490c031c1ff8eec348c6714f1adf6b905fb74eab583f450837f3d62d3531ef4ce4fe0a5227b812b7007c7a95f2556f30e891fe1755f4dd3df9f", 0xe3, 0x4, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x96) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:38 executing program 0: timer_create(0x5, &(0x7f00000002c0)={0x0, 0x18, 0x1, @thr={&(0x7f0000000200)="1755aba19de581d4934e323df39700494273803c38ebbb1a1ba43a28d3da1b45cf9ee60d259c390e1c56667e9a33327ec9144431a2271972225a57fe574158ead7d1d7c1eff6aacb621d7b6f2a622a3b3de5c7193ea423d88277597fd3f843324f377274ba892991bb59ee623e459fa3738229134e26e56c3cd70324ee4f2e86362b72dd194e39d79e2707ea53b3b2b2f1a0130e02ec9c5b988fe5f9c2bf36bb8280d5ff7c8df299bd0a46562632085c1f29e021", &(0x7f0000000340)="cd1d832380da45164e9c9fe2f76c62be445236675176088cd1a663532e81baef275e9d80c3661912bb929f30d375d9e67e35da13698efbb64485b7efff3df752c533bcd089d053ec8920bd7f613bcbc6b61a24a110402ae7e0e51ab7c51aeb0a310af0366fb068e3fbe11e363afd2dd4cb80feb04343d9deaf59ae6b50130d84f65ccb6eb33ef707943330fd3ec1b6be9eeadb5e1debe938a5336abf1f0582c50bf94407c72a"}}, &(0x7f0000000400)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self\x00', 0x60a00, 0x0) mmap(&(0x7f00000d6000/0x2000)=nil, 0x2000, 0x1800003, 0x10, r1, 0xf7305000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b9030006000000000000000000000000227f003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r2, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x1100) 07:43:38 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5cf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x9, 0x81, 0x5, 0x0, 0x0, 0x5, 0x48202, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000040)}, 0x20, 0x1ff, 0x0, 0x4, 0x2, 0x40, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xa0181, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r3 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000540)=ANY=[]) fstatfs(r3, &(0x7f0000000200)=""/131) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) utimensat(r3, &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={{r4, r5/1000+60000}, {r6, r7/1000+10000}}, 0x0) write$binfmt_script(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="2321202e2f66696c6530206d73645b730020687313ad66f05a15646f7300206d73c3597300201e0a112aa000385802af2183d02db21670c21caa3802c9a112493e8c368f1dd766156be058e671f5d0e2e33d95b4dda12ffd9ffa3c2d7c349ab89c3fcc7496ed7f13bc156863183d57500bdd456395d48ea77e39217472a3d1af28611e1c13cef1379e024e1d138bada506cd8a6d4b89c79d856fa9bca6b423309333fb165fc6c37879b1a7540400de49b06768939e963d8e9cac310660cde2e0d617c8dd43127106bf18fb57ff8299037fe51e92c19046735d59e327c0f8e1eaf56029596bf2abede4fa735f71d5ae02a1fbb90565871cf59822a6dc7fb9d9396fa964"], 0x29) r8 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r8, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x1100) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r9, r9) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) fsetxattr$security_capability(r1, &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v3={0x3000000, [{0x10000}, {0xff, 0x1}], r9}, 0x18, 0x3) 07:43:38 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000880)='/dev/bsg\x00', 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4, 0x7f}, 0x0, 0x0, r0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x4000000, &(0x7f0000000040)="3c22f59fbe0c4b7afcf69d89cfb9f0045685c1d3b87061e38668f5d245dd90ed98367d1296e29dbdf4a7066a312bf3c33a44830df7af370f0dbeac0cc13073c8d5d60b1d4637f0b0a49d247310e677e944921850b343829926fd2f2b9691c63e9a20cd27c7b908cbe1eb", &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240)="9061f0176ce4de3857986ca7d92a296931e9cdaa6747131951dcea05699b5d8c242fa71f9018f57fc70878ca66eb420d3e70c205ed227723561e0803b734d4cfe98661b3a3020d87365918121ba1727d7b699077eb34eb72155e67fa42637d0b553fd1784a7b94702e1a22295b2c31b2d301dec328907a4885d491ad130a61782e12932ab52e8d9ead53d07f4b84d7e754f9d1f5d31c4c") preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f00000ba000/0x1000)=nil, 0x1000, 0x1000000, 0x4000010, r1, 0x8000000) r3 = syz_io_uring_complete(r2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x4a8, 0xffffffff, 0x2f8, 0x0, 0x2f8, 0xffffffff, 0xffffffff, 0x410, 0x410, 0x410, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0x1d0, 0x1f8, 0x0, {}, [@common=@set={{0x40, 'set\x00'}, {{0x0, [0x1, 0x3, 0x4, 0x4, 0x1], 0x2, 0x5}}}, @common=@unspec=@comment={{0x120, 'comment\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x38}, @remote, 0xffffffff, 0xffff00, 'veth0_to_team\x00', 'erspan0\x00', {}, {}, 0x8, 0x3, 0x5c}, 0x0, 0xc0, 0x100, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x10, 0x104, 0x0, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x20, 0x0, "795f1376942c97942d7b1048ef0d34bd9800f63dd7f2403d5e4446e76322"}}}, {{@ip={@broadcast, @multicast2, 0xff000000, 0xff000000, 'ipvlan0\x00', 'veth0_to_bridge\x00', {}, {0xff}, 0x2, 0x1, 0x10}, 0x0, 0xe8, 0x118, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x1, 0x53}}, @common=@osf={{0x50, 'osf\x00'}, {'syz0\x00', 0x0, 0x8, 0x1}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0xffffffffffffffff, 0x5, 0x4}, {0x4, 0x5, 0x2}, 0x3ff, 0x7}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x508) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) clone(0x800000, &(0x7f0000000980)="498e2b8ceed1f06b2692ce6af1925e1dd5ac15741d8a43e7fffb93afd5475f4223d50ff84286ffe888cc59b7700aa3b6290e82e5294e5241db91a288489f9b853bbe7566bcef28ee56df7b53255212ebd61d3724965482b6d78afebbf8433a1b757625da9d9096630a0468acf4a91fbb529073194b278ce9c6d54d66f753a949ac319cb2c8995ec835c5d8d093b5793b05b23ba5ce4da760f345a4e921bb3db6932839b563e4bc2cb55df48bbf85911ff3af78d48fbf6fdf9e2224e0f18ad57adebada447d2c59a69121384203de5ded9240c7fb52d97c14322d9b313427d6518a01ee968d8ccd71ad1e94d3", &(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)="46c9615c017fcd625c552d4fe191749aba7622e2e145616c85d7b3bd5cec21675ad61a99238f896b1dcfa65d31cfbd611c9379979878e421c434ab835894a189623b2a459dada513c2ff1f4c8a3d664adee03a2e87dc9d4e038774e54f2f39ea1d7b1c01e544ec3fb824d9b5b5abdeb748cb4c60499be5ca382f579f36f41b1c06a348fa25f9d8ea18c57daf0ebd1a913ad630171d63f874e21bb3e8d8806388d9a9be815a613dc2b7496a4d302d7f418a533d6c772fbf31bec37088c0ae7e6783") r4 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r5 = openat$cgroup_ro(r0, &(0x7f00000008c0)='memory.swap.current\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000900)={0x0, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e21, @remote}, 0x0, 0x0, 0x0, 0x0, 0x1ef9, 0x0, 0xffffffffffffffd9}) openat$incfs(r5, &(0x7f0000000c00)='.pending_reads\x00', 0x40081, 0x4) 07:43:38 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x20000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="11d18bfc500abe857f7636265ba5a311886f4ecdc318610d44a9bd6898ed6155c8f4f3964357f1e3c5a4c86b78fbfe6a6075"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:38 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x62041200, &(0x7f0000000200)="6e4f2ed3de072ecf17a3f82b7ee8a7ae478db6dd75fcd5cce97b38d65a29ef09a12b0fc40029651f0c49e476a024d08bf830e2b82cf15f84bd2972e628d05fe369c0e044e0e0e13f746bb374ead3e85033a16fc2c5357955bda44c0f856410044aead0951921143eeee0d1c4098a1b70ce0ef8ffad0e2dc4ed72acf098579dfd511c7fc34a2de707c1080c706bfd199fec4bac0cd590df4665ba8fd32e80c7e4ce40d64485903fd1ab30a14abadb2373b0f8827c1e8f0ff799c8834121bfe2de8b2b4aa95e6b3c91905e902118262ea2d3a8", &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="f8b727bcf6f11cd7f2ce41a62b68aeaa32501c48cbb24b17ffdf5252bb1bb6e33cd7f9360c978d569d72c3aa5da577c03bc509a5846542d86ee7ccc60329") r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:38 executing program 0: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f00000000c0)={r1, 0x9, 0x7fffffff}) write$UHID_GET_REPORT_REPLY(r3, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r4 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r4, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000fe030203000600b3d7c52ebf31a8d5c8c3c6cb000400000000000000ffffffffff030000001100a3c3259b8ebf00000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b80000000000000000296b46ac83e87c2cd328e3f2103e70cfe6ad8595270de832787fb4b00b38cdcc7a8acc0fae2e7e27fca821591cfc"], 0xd8) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 122.416927][ T4848] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:43:38 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f0000004300)=[{{&(0x7f0000000240)=@nfc={0x27, 0x1, 0x0, 0x4}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000440)="bfd6ed45822aca51b842ced0be4e075e6b53b899ae9c5e3b12cbcbdd69358d4c4e51d87d08868ea30bf86e552dd441853bfd3bbd5ac413edb340f100000329b71065933c21989bd2803f5f5e203bbcae72b91aadfe07377e649e06d17e47a7533e7658e58142f0e49c60730559c001f0d02b1a37c3f0839a22224a2913e1efc1a8b76e5c3b59c2db774113df74cb939d10551b73aff47d17afae4cad82c201e08ba18f8cb5ec2d1b9cfe43836cc7e5a191a928e254a98c945683d6486a9f2dd0436b3bbd5a85ef5abb2b20abf58a93a293801b2570230e07c1c3c9b6", 0xdc}, {&(0x7f0000000540)="84afc19269eec49fe400d191d330506fdbeaf80f14bcba2d3bd1ae8dc3f88125200ba7a2aa0d146a68e22e43133be9fb657e5f558ed7174c83414d6a350ad8a24707680bfda525606600e14ab083cba02fa87c65a69f741144ed96613dc6565450db57f93a4c4a", 0x67}], 0x2}}, {{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000005c0)="8982e1a5b558426c5d2df93cb69685bd76d6932619f4b0bd5c0026bf03fbd557b8c2ea6a400be08a242fe67068c7631c4319ce2c4d5d0b0c444f8d525bc878e215fba15b8ed94e743107daa3dfcf738878ad7fe99ac249d058b1686090aa936c8fb3b67565db0f6733be7174f928978fbc04b044e16b0d06e3c684eba600c572c122ee784ede50acf40575885530696683020ececc8c37cbd0a97bb1241656b4e3a73ac99db6bd8f52", 0xa9}, {&(0x7f0000000680)="3efce22ffcf26d7259f49a1c4f37895213c5f7bc8ef7ee33d162e2f23881ef1a6f936bcf26474beaebc773e815bd233c45a7c49e0a27363062c72a1342b7e987c19d29a6dcdaf6de9d7b1c221a3ae677c89c8b5c3cb78e63f0598b0a632c1a50c608960bee6641b893fadb6d36afe63c0b8655d4c4d541e6dfb3a24c1b9713f28be0650be405113b42be146719c83bdfdebef5385dc954cc680bb8cf1f3202cd445cc87b0bcd0c07eecbfbe610038819033df0af442720390348c15107d71607666129", 0xc3}], 0x2, &(0x7f00000007c0)=[@txtime={{0x18, 0x1, 0x3d, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x9f}}, @mark={{0x14, 0x1, 0x24, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x101}}, @txtime={{0x18, 0x1, 0x3d, 0x80000001}}, @txtime={{0x18}}], 0xc0}}, {{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000880)="49e85829fdd29818b5c333dc59296baabd6d5ec107c269a9149d83169a3b4844a8e38d0d285c3096ea5e3a5a", 0x2c}, {&(0x7f00000008c0)="67e2933c1a3b1b89f563c9dbcc05113896f71d7fe605fc65fd058ed7f8c2cbb6efb227b7ba1894ce7916b8c5eeeeb137d64f550b95058b950c815dc335069a679f75cb0e4994da44800754e5a10d22d2f2b9baf133a641912e760cdca9f2dd59c7ad8198f53d3b6330ac13ad8ea0e95d88785eb5d2411c854b8caea5acc5a358023ccb6d2230de0552feec72c1603138591409403fb089fb6685d84d3a2eb4051d522e9719023cb8e19efe4d3238aed582813e88c4994a1bc5715fda22", 0xbd}, {&(0x7f0000000980)="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", 0x1000}, {&(0x7f0000001980)="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", 0x1000}, {&(0x7f0000002980)="b9c639268b0e24eb34ddc104fa0bfb9dbe3b5249df50cbb7c429a6ae6da1cc383e1434356f91dde598177f5437dcf32ec904c8acf50ad87b672b920da46d2557687e8f6a1b7e6d231849c5f93ef1e94d305461bf5811629cfdefb087d12d7728a3ac29b85292cc04f42f75e24c0cd6d7589d0eb0ba3c5439011687ffe8e114de587b0557b51d433f4e83b00e551cca7c328a946bc1141ac14c304bdc10a2e8a343bd48c14edd4ac4ad24bff4a38f7e37875f797e03f7c227fbb7cd3c468e", 0xbe}, {&(0x7f0000002a40)="9ed453c64224eb24bd2e7bc292dbe2ae03b1f86d30", 0x15}, {&(0x7f0000002a80)="c3b199698ef11e9eac44b633549e9b9c423a42171148f39bff8fc3dcfdb2e12dec055ad102a04223c60f6acded7e239d4672813be7b5649567f62ea92569d54c8c3e1a8d5e457dba8ffd9db55ba678d66e023faededb115637341bb5f082c5224eac400566c44acbec6f671d74a1e51e404838191d87a6f6391b42d2567415f30313820a8498245edcc77a38b284b11d3a1e63ab56255301fd718b8d6ea0e91d6ba14bc85febd203af9fa126703f633b3a2337dbc6b49f02465d795d883dd1487771bdb2", 0xc4}], 0x7, &(0x7f0000002c00)=[@mark={{0x14, 0x1, 0x24, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x20}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0xffffffffffffffc9}}, @mark={{0x14, 0x1, 0x24, 0x63}}], 0x78}}, {{&(0x7f0000002c80)=@generic={0x0, "9ca32e7bf63541acb5a50bb433a8b0876a7fea88dbab02b041d398e412af80556de5d7f3a1e4d5c8582edc6b7e582ff9a0fe91efb01f55a5b1496da68c73406cd4c0e368eb40005ac159c935477af15187f9a5c7b0c7cf7935bc6f94ec631d5ba278b8256c39e1d269c74fb29bb16d72ff289e30857b14c8f09cc22936e8"}, 0x80, &(0x7f00000040c0)=[{&(0x7f0000002d00)="b5a8a64b67e5d63d022aa91c6ba7710c0e3096db406d3060a650f742a9f2b5080d8d0621575fb025a7ca046949dac3e88c04788e63673533e01d6b5438019cbfd928bb8db5d7cc5c94acffeca68fce48c7a4011e1d1e92b078f8cbac551b0e71afaf9bff35c5517787791d0c4990bb4372a29e416293bcfeeb30a77f17e1d48db26062065baff5a362289100cd3624a2165c0a149928bbfdc0d177e8ff0a1b8e40a4a628343ad53f5af92d71cd86b8c2e7958a871986a1f02b48c81ddc1d5ff3357e2e56dc042bc7709e4f9b3b24a1fc2af78cbb16f995ad90786c66160eb575675a8ca97e7ce7b4dcc5dc95e11f5412", 0xf0}, {&(0x7f0000002e00)="587f7fad7e83063a4d0ab4396bb542cd6fb0c7805f9e26e8c91b5e14a5c1b748e96e2df5400aefa8cdb9b21af348f5e5fb71a8635e09ccb9cc8e3631cf956bd283dce75d4eda02717d3fb7dd03966be089e49b9b50e8d19f307687adddc4", 0x5e}, {&(0x7f0000002e80)="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", 0x1000}, {&(0x7f0000003e80)="88bee8a5bbe26dadfd560f8e55a1b9658c344061eb68f65fb3f07b33cc2f80f5bcc29791761ac2922b84f7a4140cce610ec299eff26d71ee20555653353a3064a757e151db59267f5584336d1299b952255efa209da17ad7acab169c002aab7c478382cb91491d41ef7954ba09a2151d75eda6c29196fd49e89f600f30939b47d565cd617de17f9b4d3a7c79575258abd9f108bf9e8f390113e8f82a7f5e30a73f486093bb35f0adeb13cd", 0xab}, {&(0x7f0000003f40)="49557b762e8c6b4660a571ecbede4191972df9759a8b6fccb5b4a7420cfcc4e86aff99d8ba80e330c9e8de722f1f41abb9dce4bd56fddbb21aaf0dbafa547ef290376f", 0x43}, {&(0x7f0000003fc0)="2389d1a4b530610fd32b3a6ef78c53c890ebe4f7900917c925471021a4517c2a05d5c02d595d553f59164dbeb0c42f943ec9b4019b27cbf09ac9ffa5b6e640d2bed09ce60570d02c905d1b9699b7ed11bf22a6b1468b31778625a05516388670746c6b415ebdf7b593bda1168b2901d90bf5f434102a58f518dd4ed718c95fa556af382901cca2d64651ef6b651806cafc715e3ac78be2f9156efd3a5c1a0e9263a2c6f9562fac697212b29a416f86d3e518d58c62901d399f8e0cbf3b200b5da21e8cc01700bbde76a05744f2212901837510dcbfdebc7ec9d3d0482c6c36597be70eaba78a951360bf0c5c", 0xec}], 0x6}}, {{&(0x7f0000004140)=@in6={0xa, 0x4e22, 0x1, @mcast1, 0x4}, 0x80, &(0x7f0000004280)=[{&(0x7f00000041c0)}, {&(0x7f0000004200)="ac2b5e6e999ee257af01a12523ae3c9891fbabbb87d0ca08c52c6d9f1593bc6940c3a04565c6a0575c6745eac136a2c5344b516b90795c3c7b3d00982933220d4353cebb5791c5fe7b094ba30f841a58c41ae2caa42b2278ff5fa50db0cfcf7a7d39d02913fede4253e11a68986e4b4d564c23", 0x73}], 0x2, &(0x7f00000042c0)=[@txtime={{0x18, 0x1, 0x3d, 0x2}}, @mark={{0x14, 0x1, 0x24, 0x20}}], 0x30}}], 0x5, 0x8000) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0x0, 0x3}}, 0xa) write$UHID_INPUT2(r1, &(0x7f0000004440)={0xc, {0xf8, "386e5f7f901ddf183346d2a4923e6ce9eb8a221c7e8a9cbe022c65d7f93b90247560ef8137792d1d644b0b5443beec9da6c05f7c396cbac4818bbdcc3299e3bb9781bef87c1feded12641aa6aefaceb33afb825be52403ed66b96ae64e288ffb7cb433720a9ecb50ab6cdafdd096b121251b0cee53c2e2f7b6f680dae4c82a4d9e10a61212e18d7e292928a431225b3ad47be014e222908051abc2391d1f4783882650245cf055e370ee273628e67637ef96ed0d522387a100d38b3e15667ee8884dae01d47094ed84ff88d956f8f3b264e4563616c899f4c18d5b757b8f29e417130f74c5eeaea463a40bd3f27a60c8b6f603f0cef07cf8"}}, 0xfe) memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) clone(0x41200, &(0x7f0000000040)="2ca90e8fa58a476e486f1274727981dba25f1ebd02b1bf0ad95be8f25806aaaa6d8f950b829a5200809e8752b58a20a1a07ea0929521b9ef9427663a19533fa8fdb8450b77c407c5cf7fe4a5616ba15b2d14ce226b8ab64a8b69ce71287f0e55", &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000340)="a8984d6c22a8a8897fb8eea5f2af2f3c955d6a3557255e559ad777a73a960f5df8ef409e5ccf863a7b4216029588a4a3edf68bcc66ef17ea58cc3c7c31f0d5815e09b838a52eb90219b29ae622e018f6ae18c8678e5fa904e2eb4b8a6c2e5ca9bcea48e0fc47bf0df0b494d93a80db7ed243595d2a530c503dcba24fc2e4248f1df857507cef295683c1a80a7314ef9980862e9a0548ba8d787a2c390b1ba55f856ca963538dfd256ed344edf42b2663fd24de3e2b515ccba1fd966efb8b08927d5c17421669f99675c912c5bb40482a6d85b18d6427bcea5e4f846d671d593da6d6b8045a5a69ff4e94e95b5e1f15") 07:43:38 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:39 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000880)='/dev/bsg\x00', 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4, 0x7f}, 0x0, 0x0, r0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x4000000, &(0x7f0000000040)="3c22f59fbe0c4b7afcf69d89cfb9f0045685c1d3b87061e38668f5d245dd90ed98367d1296e29dbdf4a7066a312bf3c33a44830df7af370f0dbeac0cc13073c8d5d60b1d4637f0b0a49d247310e677e944921850b343829926fd2f2b9691c63e9a20cd27c7b908cbe1eb", &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240)="9061f0176ce4de3857986ca7d92a296931e9cdaa6747131951dcea05699b5d8c242fa71f9018f57fc70878ca66eb420d3e70c205ed227723561e0803b734d4cfe98661b3a3020d87365918121ba1727d7b699077eb34eb72155e67fa42637d0b553fd1784a7b94702e1a22295b2c31b2d301dec328907a4885d491ad130a61782e12932ab52e8d9ead53d07f4b84d7e754f9d1f5d31c4c") preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f00000ba000/0x1000)=nil, 0x1000, 0x1000000, 0x4000010, r1, 0x8000000) r3 = syz_io_uring_complete(r2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x4a8, 0xffffffff, 0x2f8, 0x0, 0x2f8, 0xffffffff, 0xffffffff, 0x410, 0x410, 0x410, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0x1d0, 0x1f8, 0x0, {}, [@common=@set={{0x40, 'set\x00'}, {{0x0, [0x1, 0x3, 0x4, 0x4, 0x1], 0x2, 0x5}}}, @common=@unspec=@comment={{0x120, 'comment\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x38}, @remote, 0xffffffff, 0xffff00, 'veth0_to_team\x00', 'erspan0\x00', {}, {}, 0x8, 0x3, 0x5c}, 0x0, 0xc0, 0x100, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x10, 0x104, 0x0, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x20, 0x0, "795f1376942c97942d7b1048ef0d34bd9800f63dd7f2403d5e4446e76322"}}}, {{@ip={@broadcast, @multicast2, 0xff000000, 0xff000000, 'ipvlan0\x00', 'veth0_to_bridge\x00', {}, {0xff}, 0x2, 0x1, 0x10}, 0x0, 0xe8, 0x118, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x1, 0x53}}, @common=@osf={{0x50, 'osf\x00'}, {'syz0\x00', 0x0, 0x8, 0x1}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0xffffffffffffffff, 0x5, 0x4}, {0x4, 0x5, 0x2}, 0x3ff, 0x7}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x508) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) clone(0x800000, &(0x7f0000000980)="498e2b8ceed1f06b2692ce6af1925e1dd5ac15741d8a43e7fffb93afd5475f4223d50ff84286ffe888cc59b7700aa3b6290e82e5294e5241db91a288489f9b853bbe7566bcef28ee56df7b53255212ebd61d3724965482b6d78afebbf8433a1b757625da9d9096630a0468acf4a91fbb529073194b278ce9c6d54d66f753a949ac319cb2c8995ec835c5d8d093b5793b05b23ba5ce4da760f345a4e921bb3db6932839b563e4bc2cb55df48bbf85911ff3af78d48fbf6fdf9e2224e0f18ad57adebada447d2c59a69121384203de5ded9240c7fb52d97c14322d9b313427d6518a01ee968d8ccd71ad1e94d3", &(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)="46c9615c017fcd625c552d4fe191749aba7622e2e145616c85d7b3bd5cec21675ad61a99238f896b1dcfa65d31cfbd611c9379979878e421c434ab835894a189623b2a459dada513c2ff1f4c8a3d664adee03a2e87dc9d4e038774e54f2f39ea1d7b1c01e544ec3fb824d9b5b5abdeb748cb4c60499be5ca382f579f36f41b1c06a348fa25f9d8ea18c57daf0ebd1a913ad630171d63f874e21bb3e8d8806388d9a9be815a613dc2b7496a4d302d7f418a533d6c772fbf31bec37088c0ae7e6783") r4 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r5 = openat$cgroup_ro(r0, &(0x7f00000008c0)='memory.swap.current\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000900)={0x0, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e21, @remote}, 0x0, 0x0, 0x0, 0x0, 0x1ef9, 0x0, 0xffffffffffffffd9}) openat$incfs(r5, &(0x7f0000000c00)='.pending_reads\x00', 0x40081, 0x4) 07:43:39 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x4000, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b4c0f17e3b0b612272da4880348d1829ae697139777dd64e81a1ac4bc7671b800"/160], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:39 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x1, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x1, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x1, 0x0, 0x0) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000640)={0x0, r1}, 0x10) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000200)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000280)="ff4c90c8c6b57cd521d20cc069bbfd2de42a0e6cc6ca1ac29953a2d05ff08facdead444e40553d73a0c9b378dd4096ebeb676da51199f72f8e66286ce9da73217251fab6bc9ed3562a60ca9b", 0x4c}, {&(0x7f0000000340)="d188612b44c9fac0415b69b41995adec9a6028eaf0e4991f8c5601a2818529854f5b0f0192588ea4df1d0fccd5269d8336731fe18e8bc821891e66b696a4593df838c5ca2d8607d34fa9043f40e7ecca18fbf0bae824fb578d6f46f50e55e23f810850d2f4ea1ff33f60923da9ce8451ad77ab92066f463ad16acbfb7bcf28e1e931eec2cf808c17b8ccc83218d5", 0x8e}], 0x2, &(0x7f0000000680)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff}}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [r1, r0, r2, 0xffffffffffffffff, r2]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, r1, r3, 0xffffffffffffffff, r2, r4, r5, r1, r6]}}], 0xc0, 0x90}, {&(0x7f0000000740)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000cc0)=[{&(0x7f00000007c0)="4fb6523adc1f2c882bed5f3b506522ffa4a4ca3f", 0x14}, {&(0x7f0000000800)="ec8b63f9df030b648b139aa40a97be903ca4783a6320d5e4c5a5a07f4b4b2d5e2942a0d63be717ede09a74d2426eb2e2556eef3cff513fedf0beb8a3864c395ade747e55bf14a3a5dbaf6fb48f3f447a7f267384737a7f8ef1cb663ecc4acb780c9d2476df1faa5c76228d289f49e2288fbbc904901791d727e964276eb696cecf31d207af9b3df70c753e5e26c1d030447656a30494ad6d4f2b9900a38bf8f592696af7f622dae06b695c1eeb3daee5c9d6851876fdb1012cad429411f69b611f61a2cbc19e5227224bc543e9bdf654adc15349d045182745719ee3b4ae165878cff6963f366276d068229cbbbeaa6c0f6b5456c5811e800b37319da6a40e", 0xff}, {&(0x7f0000000900)="ad193dcb9d37c55d400f9f7df9584abc474d45825152126e77e73032ed5973e4d15443b1cb0c0132bbea3e13ef563edf2910ec7411caece66a427ad9431be70706dfb241ab4d52a5f36a02bbf3dd88b4d2aa1f34e4b13bd36a29b3bccbab282422ce5616bf5d196e481057fa223212ddd8a6f2df466a1f9fbdf16b220437021ede2fc1fc96517f6bb0fd9cb4267c5663701d6b08f4137af509c14dae160d63a1d84b21187d729890dbdb183bb77c8cb6c6e7ab6db612877f2d3e", 0xba}, {&(0x7f00000009c0)="2c5e327b2322e28ae5dc9dca5ecc149333281355a24a0b21154c74247c7cd9d9921f0ecbcb827afe268582b030e76d4cd767d41ec4e55f2c952816228e02cfab913e34dc9d45901f3647e4000c6f701dca9fb0c6d282aede075a6aa61535aaf35520457e9914ef5792076f79ad2919832f08aa6ae3a4e52b037953389064df10ef2e1c035de24975", 0x88}, {&(0x7f0000000a80)="39a51f9a05cc46d56642301863aaf2f77033884fbbe068ecaeb2ad2b9870c4d67774c1714c074fa15f86ee2cfb8403baed935b84594b75b2b3138d0acc27059371005f1d0559a5f25ade8100ea870f380f3649d60e04f1d4b92f320faed0c2e9a9980091289633d6254bc6a1a66e3effcea726e4b4c41ab02ca60655c92d3514a7cc88743018e727370c3ab4b9b2cf41c4391562e36365fa1b043d87032e8a8bd24b3d", 0xa3}, {&(0x7f0000000b40)="0876b2cf6030e84d521e8253bbe063df40d1cb15e6bf4098ff85350ecbb0", 0x1e}, {&(0x7f0000000b80)="c34c539af7914ce48a7912030ad13d2b417c8770d5d500521fad90d22cfea016738e4edf2d169d03a6522e5c4072fbfeff40aa1a065bfb6c9ceff34f0e4c1f5a8373c8de01c9815d4a41df492d5cae86f4efa40dce4f290732060fb081a7059caf39f334fe7eabdf", 0x68}, {&(0x7f0000000c00)="a6aecbc0ec20f6a237b939fcb6bea52ca74bdb972b9ec3a0879fd4b80e6fd5ecdaa339ed61acd10d1f2d4e3d2c03a211f23db397b8c47fd96316c0e9a32c135d55cb3d51ba56a57c6186ffc0dc871025a24817c6a1f2561e854dc0e9ccf30613ef8dab3237c657f808d106381d7f3e60ed3bdf39c7d518870d329b7d23944c20f9535a6dbfe1c1d4e8dda280dd2dfa9a8f725cef9507b977829dd2c7172cc3c71654dd13a8e3e76f", 0xa8}], 0x8, 0x0, 0x0, 0x4}], 0x2, 0x4801) 07:43:39 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000200), &(0x7f0000000240)=0xc) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) write$binfmt_elf32(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:39 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000880)='/dev/bsg\x00', 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4, 0x7f}, 0x0, 0x0, r0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x4000000, &(0x7f0000000040)="3c22f59fbe0c4b7afcf69d89cfb9f0045685c1d3b87061e38668f5d245dd90ed98367d1296e29dbdf4a7066a312bf3c33a44830df7af370f0dbeac0cc13073c8d5d60b1d4637f0b0a49d247310e677e944921850b343829926fd2f2b9691c63e9a20cd27c7b908cbe1eb", &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240)="9061f0176ce4de3857986ca7d92a296931e9cdaa6747131951dcea05699b5d8c242fa71f9018f57fc70878ca66eb420d3e70c205ed227723561e0803b734d4cfe98661b3a3020d87365918121ba1727d7b699077eb34eb72155e67fa42637d0b553fd1784a7b94702e1a22295b2c31b2d301dec328907a4885d491ad130a61782e12932ab52e8d9ead53d07f4b84d7e754f9d1f5d31c4c") preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f00000ba000/0x1000)=nil, 0x1000, 0x1000000, 0x4000010, r1, 0x8000000) r3 = syz_io_uring_complete(r2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x4a8, 0xffffffff, 0x2f8, 0x0, 0x2f8, 0xffffffff, 0xffffffff, 0x410, 0x410, 0x410, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0x1d0, 0x1f8, 0x0, {}, [@common=@set={{0x40, 'set\x00'}, {{0x0, [0x1, 0x3, 0x4, 0x4, 0x1], 0x2, 0x5}}}, @common=@unspec=@comment={{0x120, 'comment\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x38}, @remote, 0xffffffff, 0xffff00, 'veth0_to_team\x00', 'erspan0\x00', {}, {}, 0x8, 0x3, 0x5c}, 0x0, 0xc0, 0x100, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x10, 0x104, 0x0, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x20, 0x0, "795f1376942c97942d7b1048ef0d34bd9800f63dd7f2403d5e4446e76322"}}}, {{@ip={@broadcast, @multicast2, 0xff000000, 0xff000000, 'ipvlan0\x00', 'veth0_to_bridge\x00', {}, {0xff}, 0x2, 0x1, 0x10}, 0x0, 0xe8, 0x118, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x1, 0x53}}, @common=@osf={{0x50, 'osf\x00'}, {'syz0\x00', 0x0, 0x8, 0x1}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0xffffffffffffffff, 0x5, 0x4}, {0x4, 0x5, 0x2}, 0x3ff, 0x7}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x508) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) clone(0x800000, &(0x7f0000000980)="498e2b8ceed1f06b2692ce6af1925e1dd5ac15741d8a43e7fffb93afd5475f4223d50ff84286ffe888cc59b7700aa3b6290e82e5294e5241db91a288489f9b853bbe7566bcef28ee56df7b53255212ebd61d3724965482b6d78afebbf8433a1b757625da9d9096630a0468acf4a91fbb529073194b278ce9c6d54d66f753a949ac319cb2c8995ec835c5d8d093b5793b05b23ba5ce4da760f345a4e921bb3db6932839b563e4bc2cb55df48bbf85911ff3af78d48fbf6fdf9e2224e0f18ad57adebada447d2c59a69121384203de5ded9240c7fb52d97c14322d9b313427d6518a01ee968d8ccd71ad1e94d3", &(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)="46c9615c017fcd625c552d4fe191749aba7622e2e145616c85d7b3bd5cec21675ad61a99238f896b1dcfa65d31cfbd611c9379979878e421c434ab835894a189623b2a459dada513c2ff1f4c8a3d664adee03a2e87dc9d4e038774e54f2f39ea1d7b1c01e544ec3fb824d9b5b5abdeb748cb4c60499be5ca382f579f36f41b1c06a348fa25f9d8ea18c57daf0ebd1a913ad630171d63f874e21bb3e8d8806388d9a9be815a613dc2b7496a4d302d7f418a533d6c772fbf31bec37088c0ae7e6783") r4 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r5 = openat$cgroup_ro(r0, &(0x7f00000008c0)='memory.swap.current\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000900)={0x0, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e21, @remote}, 0x0, 0x0, 0x0, 0x0, 0x1ef9, 0x0, 0xffffffffffffffd9}) openat$incfs(r5, &(0x7f0000000c00)='.pending_reads\x00', 0x40081, 0x4) 07:43:39 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040)={0x0, r0}, 0x10) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000009, 0x80010, r2, 0xd59a2000) 07:43:39 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f0000000200)={0x13, 0x2, &(0x7f0000000340)}) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b73800000057003510c38422a3bc822000050000000402030006000000000020000400b3d7c52ebf31a8d5c8c3c6cb00000009e500f8ffffffffffffff03000000110000000d60395a7088d7c27f000000a9030001007ea85ca6576b9a992da4880348d1829ae697139777dd64e81a1ac4bc7671b8"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:39 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3c43, 0x24060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 07:43:39 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) clone(0x56098000, &(0x7f0000000200)="f5c787e12d12d012beb95378dab6039e3178bd8da1444183325b02aec2fba88c698de19aa6a5b4dcb73239fb748e1dc647baf7d0a3f4dd61e31d20cecfe9e5aec1f4a0008a5585f847da0451cd62ca2df9eb2e0db9245ba708aeef4213517af31ecaaf7a1c809e752e895a59cab57e19c6064b242c9453cb65a00e513b0efd21a102457e9940d37549d3fda191e96a61145cb807240b2ec754e54d23def720581d45436500210c10f947333bc321fe6962873c20e343519487ee7ad646801f483df603c25e25cf5e8df32c021851b1bb6c8ed9442296dafd8bfeb0629bcd7a17408d7875750ded9eec79718a671df7d692a23c", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000300)="d9e194ef5811d33a0b23a92a1efc2fc560e850dd4197895b3a") r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0xb8, 0x1f, 0x3, 0x2, 0x0, 0x1, 0xa0000, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000340), 0x1}, 0x44, 0x80, 0x8, 0x3, 0x7, 0x10000, 0x9}, 0x0, 0x10, r1, 0x8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r2, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1100) 07:43:39 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xa, {0x8, 0xa0, 0x3}}, 0xa) r1 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040)={0x0, r0}, 0x10) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000009, 0x80010, r2, 0xd59a2000) [ 124.631080][ T4954] cgroup1: Unknown subsys name 'perf_event' [ 124.637452][ T4954] cgroup1: Unknown subsys name 'net_cls' [ 124.675442][ T4954] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.682517][ T4954] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.690372][ T4954] device bridge_slave_0 entered promiscuous mode [ 124.697508][ T4954] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.704545][ T4954] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.712414][ T4954] device bridge_slave_1 entered promiscuous mode [ 124.751012][ T4954] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.758054][ T4954] bridge0: port 2(bridge_slave_1) entered forwarding state [ 124.765364][ T4954] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.776050][ T4954] bridge0: port 1(bridge_slave_0) entered forwarding state [ 124.797377][ T1490] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.804674][ T1490] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.812652][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 124.820901][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 124.836655][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 124.844730][ T118] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.851754][ T118] bridge0: port 1(bridge_slave_0) entered forwarding state [ 124.860094][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 124.868583][ T118] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.875711][ T118] bridge0: port 2(bridge_slave_1) entered forwarding state [ 124.883036][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 124.905687][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 124.914245][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 124.922248][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 124.930882][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 124.943654][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 124.953224][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 125.615828][ T7] device bridge_slave_1 left promiscuous mode [ 125.621967][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.629423][ T7] device bridge_slave_0 left promiscuous mode [ 125.635514][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.583844][ T4963] cgroup1: Unknown subsys name 'perf_event' [ 126.590040][ T4963] cgroup1: Unknown subsys name 'net_cls' [ 126.628357][ T4963] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.635401][ T4963] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.643220][ T4963] device bridge_slave_0 entered promiscuous mode [ 126.650341][ T4963] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.657648][ T4963] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.664947][ T4963] device bridge_slave_1 entered promiscuous mode [ 126.704014][ T4963] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.711048][ T4963] bridge0: port 2(bridge_slave_1) entered forwarding state [ 126.718345][ T4963] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.725347][ T4963] bridge0: port 1(bridge_slave_0) entered forwarding state [ 126.733557][ T1490] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.741027][ T1490] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.762326][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 126.771083][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 126.780800][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 126.789192][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 126.797397][ T1490] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.804429][ T1490] bridge0: port 1(bridge_slave_0) entered forwarding state [ 126.826128][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 126.834343][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 126.843763][ T1490] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.851760][ T1490] bridge0: port 2(bridge_slave_1) entered forwarding state [ 126.859098][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 126.867219][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 126.875113][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 126.883233][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 126.891245][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 126.899685][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 126.915597][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 126.923522][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 126.931818][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 126.940058][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 126.951870][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 126.960341][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 126.970140][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 126.978986][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 127.715803][ T166] device bridge_slave_1 left promiscuous mode [ 127.721940][ T166] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.729420][ T166] device bridge_slave_0 left promiscuous mode [ 127.735924][ T166] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.610996][ T4972] cgroup1: Unknown subsys name 'perf_event' [ 128.617232][ T4972] cgroup1: Unknown subsys name 'net_cls' [ 128.654862][ T4972] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.661925][ T4972] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.669430][ T4972] device bridge_slave_0 entered promiscuous mode [ 128.676412][ T4972] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.683407][ T4972] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.690919][ T4972] device bridge_slave_1 entered promiscuous mode [ 128.729517][ T4972] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.736541][ T4972] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.743765][ T4972] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.750794][ T4972] bridge0: port 1(bridge_slave_0) entered forwarding state [ 128.771809][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 128.780059][ T378] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.788255][ T378] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.798233][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 128.806535][ T1490] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.813534][ T1490] bridge0: port 1(bridge_slave_0) entered forwarding state [ 128.836611][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 128.846869][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 128.854943][ T378] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.861982][ T378] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.869474][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 128.877481][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 128.895701][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 128.903485][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 128.911981][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 128.920275][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 128.929203][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 128.937654][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 128.947117][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 128.955261][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 129.615889][ T7] device bridge_slave_1 left promiscuous mode [ 129.622150][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.629749][ T7] device bridge_slave_0 left promiscuous mode [ 129.635955][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.611635][ T4982] cgroup1: Unknown subsys name 'perf_event' [ 130.617780][ T4982] cgroup1: Unknown subsys name 'net_cls' [ 130.654883][ T4982] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.661977][ T4982] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.669486][ T4982] device bridge_slave_0 entered promiscuous mode [ 130.676441][ T4982] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.683438][ T4982] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.690934][ T4982] device bridge_slave_1 entered promiscuous mode [ 130.727965][ T4982] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.734988][ T4982] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.742282][ T4982] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.749319][ T4982] bridge0: port 1(bridge_slave_0) entered forwarding state [ 130.770142][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 130.778476][ T1490] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.786497][ T1490] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.795428][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 130.803573][ T378] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.810598][ T378] bridge0: port 1(bridge_slave_0) entered forwarding state [ 130.819401][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 130.827946][ T1490] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.834942][ T1490] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.856490][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 130.864689][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 130.873063][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 130.883838][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 130.897352][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 130.913842][ T97] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 130.922154][ T97] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 131.756336][ T166] device bridge_slave_1 left promiscuous mode [ 131.762506][ T166] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.770392][ T166] device bridge_slave_0 left promiscuous mode [ 131.776858][ T166] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.558415][ T4991] cgroup1: Unknown subsys name 'perf_event' [ 132.564524][ T4991] cgroup1: Unknown subsys name 'net_cls' [ 132.603044][ T4991] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.610094][ T4991] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.617598][ T4991] device bridge_slave_0 entered promiscuous mode [ 132.624468][ T4991] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.631512][ T4991] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.638823][ T4991] device bridge_slave_1 entered promiscuous mode [ 132.677408][ T4991] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.684778][ T4991] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.692065][ T4991] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.699102][ T4991] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.720084][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 132.728452][ T67] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.735589][ T67] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.745535][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 132.753709][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.760742][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.776203][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 132.784300][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.791343][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.798991][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 132.808125][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 132.825836][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 132.834092][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 132.849004][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 132.865286][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 132.874451][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 133.546010][ T7] device bridge_slave_1 left promiscuous mode [ 133.552141][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.559647][ T7] device bridge_slave_0 left promiscuous mode [ 133.565852][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.504164][ T5001] cgroup1: Unknown subsys name 'perf_event' [ 134.510888][ T5001] cgroup1: Unknown subsys name 'net_cls' [ 134.549277][ T5001] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.556718][ T5001] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.564296][ T5001] device bridge_slave_0 entered promiscuous mode [ 134.571695][ T5001] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.578939][ T5001] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.586569][ T5001] device bridge_slave_1 entered promiscuous mode [ 134.624420][ T5001] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.631622][ T5001] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.639629][ T5001] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.647208][ T5001] bridge0: port 1(bridge_slave_0) entered forwarding state [ 134.668822][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 134.677053][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.684250][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.696091][ T97] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 134.704557][ T97] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.711991][ T97] bridge0: port 1(bridge_slave_0) entered forwarding state [ 134.721607][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 134.730633][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.738294][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.752752][ T97] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 134.763005][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 134.779538][ T97] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 134.795933][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 134.807496][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 134.820141][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 134.830585][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 135.516547][ T166] device bridge_slave_1 left promiscuous mode [ 135.522858][ T166] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.531511][ T166] device bridge_slave_0 left promiscuous mode [ 135.537976][ T166] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.480310][ T5010] cgroup1: Unknown subsys name 'perf_event' [ 136.486980][ T5010] cgroup1: Unknown subsys name 'net_cls' [ 136.524702][ T5010] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.531965][ T5010] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.540008][ T5010] device bridge_slave_0 entered promiscuous mode [ 136.547520][ T5010] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.555395][ T5010] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.563554][ T5010] device bridge_slave_1 entered promiscuous mode [ 136.601690][ T5010] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.608966][ T5010] bridge0: port 2(bridge_slave_1) entered forwarding state [ 136.616358][ T5010] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.623389][ T5010] bridge0: port 1(bridge_slave_0) entered forwarding state [ 136.644665][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 136.653233][ T378] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.661212][ T378] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.671191][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 136.679788][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.687067][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 136.696150][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 136.705494][ T378] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.712609][ T378] bridge0: port 2(bridge_slave_1) entered forwarding state [ 136.726998][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 136.746068][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 136.754649][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 136.763085][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 136.785538][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 136.794965][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 136.803725][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 137.635955][ T166] device bridge_slave_1 left promiscuous mode [ 137.642856][ T166] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.650917][ T166] device bridge_slave_0 left promiscuous mode [ 137.657385][ T166] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.473673][ T5020] cgroup1: Unknown subsys name 'perf_event' [ 138.480312][ T5020] cgroup1: Unknown subsys name 'net_cls' [ 138.520455][ T5020] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.528186][ T5020] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.536816][ T5020] device bridge_slave_0 entered promiscuous mode [ 138.544125][ T5020] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.551377][ T5020] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.559003][ T5020] device bridge_slave_1 entered promiscuous mode [ 138.596853][ T5020] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.604419][ T5020] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.611748][ T5020] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.619651][ T5020] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.641346][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 138.650022][ T378] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.658236][ T378] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.668829][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 138.677731][ T1490] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.685360][ T1490] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.706805][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 138.715060][ T378] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.722352][ T378] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.730773][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 138.739708][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 138.750037][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 138.765869][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 138.774012][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 138.788115][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 138.801430][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 139.516571][ T7] device bridge_slave_1 left promiscuous mode [ 139.523331][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.531328][ T7] device bridge_slave_0 left promiscuous mode [ 139.539376][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.417130][ T5029] cgroup1: Unknown subsys name 'perf_event' [ 140.423239][ T5029] cgroup1: Unknown subsys name 'net_cls' [ 140.461364][ T5029] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.468413][ T5029] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.476297][ T5029] device bridge_slave_0 entered promiscuous mode [ 140.483132][ T5029] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.490682][ T5029] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.498319][ T5029] device bridge_slave_1 entered promiscuous mode [ 140.536389][ T5029] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.543415][ T5029] bridge0: port 2(bridge_slave_1) entered forwarding state [ 140.550696][ T5029] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.557742][ T5029] bridge0: port 1(bridge_slave_0) entered forwarding state [ 140.579060][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 140.587001][ T118] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.594125][ T118] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.603916][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 140.612060][ T358] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.619104][ T358] bridge0: port 1(bridge_slave_0) entered forwarding state [ 140.628168][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 140.636681][ T118] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.643679][ T118] bridge0: port 2(bridge_slave_1) entered forwarding state [ 140.666621][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 140.674902][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 140.683355][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 140.691505][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 140.704932][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 140.717752][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 140.731611][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 141.415963][ T166] device bridge_slave_1 left promiscuous mode [ 141.422087][ T166] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.429577][ T166] device bridge_slave_0 left promiscuous mode [ 141.435945][ T166] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.355880][ T5039] cgroup1: Unknown subsys name 'perf_event' [ 142.361985][ T5039] cgroup1: Unknown subsys name 'net_cls' [ 142.399314][ T5039] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.406415][ T5039] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.413726][ T5039] device bridge_slave_0 entered promiscuous mode [ 142.421278][ T5039] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.428656][ T5039] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.436314][ T5039] device bridge_slave_1 entered promiscuous mode [ 142.475369][ T5039] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.482417][ T5039] bridge0: port 2(bridge_slave_1) entered forwarding state [ 142.489709][ T5039] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.496741][ T5039] bridge0: port 1(bridge_slave_0) entered forwarding state [ 142.517806][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 142.525600][ T358] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.534340][ T358] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.556677][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 142.564774][ T1490] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.571843][ T1490] bridge0: port 1(bridge_slave_0) entered forwarding state [ 142.579190][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 142.587780][ T1490] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.594802][ T1490] bridge0: port 2(bridge_slave_1) entered forwarding state [ 142.602142][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 142.610163][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 142.620053][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 142.631094][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 142.644724][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 142.658443][ T1490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 142.671103][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 143.436635][ T166] device bridge_slave_1 left promiscuous mode [ 143.442796][ T166] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.450310][ T166] device bridge_slave_0 left promiscuous mode [ 143.456686][ T166] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.306848][ T5048] cgroup1: Unknown subsys name 'perf_event' [ 144.312976][ T5048] cgroup1: Unknown subsys name 'net_cls' [ 144.350645][ T5048] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.357706][ T5048] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.365015][ T5048] device bridge_slave_0 entered promiscuous mode [ 144.372464][ T5048] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.380283][ T5048] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.388041][ T5048] device bridge_slave_1 entered promiscuous mode [ 144.426809][ T5048] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.433820][ T5048] bridge0: port 2(bridge_slave_1) entered forwarding state [ 144.441108][ T5048] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.448155][ T5048] bridge0: port 1(bridge_slave_0) entered forwarding state [ 144.469736][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 144.478138][ T387] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.485369][ T387] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.506800][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 144.514876][ T387] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.521953][ T387] bridge0: port 1(bridge_slave_0) entered forwarding state [ 144.530274][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 144.538701][ T387] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.545764][ T387] bridge0: port 2(bridge_slave_1) entered forwarding state [ 144.553045][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 144.561122][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 144.572047][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 144.582973][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 144.596715][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 144.609002][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 144.621989][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2021/02/28 07:44:01 executor 4 failed 11 times: executor 4: exit status 67 SYZFAIL: mmap of input file failed (errno 19: No such device) SYZFAIL: child failed (errno 0: Success) loop exited with status 67