, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:27 executing program 0: syz_read_part_table(0x4000080000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:27 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x0, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:27 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x0, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:27 executing program 0: syz_read_part_table(0x8003000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:27 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:27 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x0, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:27 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x0, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:27 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x7, 0x86098, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:27 executing program 0: syz_read_part_table(0x8004000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:27 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x0, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:27 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:27 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x0, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:27 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x0, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:27 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:27 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x0, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:27 executing program 0: syz_read_part_table(0xeffdffffffffffff, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:27 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x0, 0x2e, 0x1f, 0x2c20, 0x5, 0x9, 0xffffffffffffff67, 0x9, 0x6}, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x0, 0x1, 0x5, 0x54d, 0x0, 0x0, 0x0, 0x9, 0x41d0}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) r4 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$NL80211_CMD_GET_MPATH(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYRES16=0x0, @ANYRES32=0x0, @ANYBLOB="0c00c4a0754c00006e0000000a00060008021100000000000a00010000001100000000000a001a0008021100000100000500060008021100000000000a000600080211000001000000000000000a001a0008021100000100000a001a00ffffffffffff00000a00060008021100000100000a00060008021100000100000a001a00080211000001474ef31be35b33471100"/156], 0xb8}, 0x1, 0x0, 0x0, 0x4000}, 0x804) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0xe551a22d0ebda652, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local}) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, 0x0) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local, @private1, @private0={0xfc, 0x0, '\x00', 0x1}}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 01:26:27 executing program 5: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x40, r0, 0x300, 0x70bd28, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x1000, 0x17}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x40}, 0x1, 0x0, 0x0, 0x8040}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r1, 0xa) r2 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a4e5f083942d37c70f0003003e080039a59434c8fb93160d20001000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:27 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x0, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:27 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:27 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x0, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:27 executing program 0: syz_read_part_table(0xf6ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:27 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:27 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0xfffffffffffffffd, 0x3d9}, 0x0, 0x8, r1, 0xa) r3 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r4, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59425c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r3, 0x0, 0x100021) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) ioctl$BTRFS_IOC_ADD_DEV(r0, 0x5000940a, &(0x7f0000000580)={{r2}, "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"}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:27 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x0, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:28 executing program 0: syz_read_part_table(0xfeffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:28 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x17, 0x7fff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x80) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) getrlimit(0xd, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x1f, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x2}, 0x4000, 0x0, 0x80000001, 0x6, 0x4, 0x3d9, 0x0, 0x0, 0x5}, 0x0, 0x8, r0, 0x9) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="7ffe837e154c2a50d8508f02b0454464060039a59434c80a006a0a2000"/52], 0x3c) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000000)='0', 0x1}, {0x0}], 0x2) fallocate(r4, 0xd, 0x9, 0x7) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) syz_open_procfs(r1, &(0x7f0000000380)='task\x00') execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:28 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f0f, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x36, 0x0, 0x5, 0x0, 0x3}, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002680), 0x0, 0x40000022, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f00000007c0)="30eb2297b18c0a2ada6f46f8341ce63ccdab668e820dabde", 0x41395563) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500)}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x80, 0x7e, 0x3, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000003240), 0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3, 0x100000000, 0x0, 0x0, 0x0, 0xe7}, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) writev(r3, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9623b", 0x8b}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a94", 0x8d}, {&(0x7f0000001340)="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", 0x1b9}], 0x3) sendto$inet(r3, &(0x7f00000012c0)="1a268a927f1f6588b967481241ba78600453f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 01:26:28 executing program 0: syz_read_part_table(0xffffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:28 executing program 0: syz_read_part_table(0xffffffffffff0700, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:28 executing program 0: syz_read_part_table(0xfffffffffffffdef, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:28 executing program 0: syz_read_part_table(0xffffffffffffffff, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:30 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:30 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="02f605020306af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:30 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x4, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3800}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000040)={'sit0\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x4, 0x20, 0x80, 0x5079, 0x0, @empty, @remote, 0x0, 0x80, 0xfeb7}}) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1, 0x3, 0x0, 0x0, 0x0, 0x30, 0x10}, @ldst={0x0, 0x3, 0x1, 0x5, 0x1, 0x1}]}, &(0x7f00000000c0)='GPL\x00', 0x5, 0xf5, &(0x7f0000000440)=""/245, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x6, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x9, 0x0, 0x5000000}, 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={0x5, 0x1, 0x100, 0x7}, &(0x7f00000006c0)=0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x5}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xc, 0x2, &(0x7f0000000080)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0xfffffffb}], &(0x7f0000000180)='syzkaller\x00', 0x6, 0x90, &(0x7f0000000280)=""/144, 0x41000, 0x4, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0xa, 0x3369, 0xff}, 0x10, r4, r3}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x16, 0x4, &(0x7f0000000140)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x2, 0x2, 0x0, 0xa, 0xfffffffffffffff0, 0x8}, @jmp={0x5, 0x1, 0x6, 0x5, 0x0, 0x18, 0x8}], &(0x7f0000000180)='GPL\x00', 0x6, 0x96, &(0x7f00000002c0)=""/150, 0x100, 0x1, '\x00', 0x0, 0x1c, r1, 0x8, &(0x7f0000000200)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x6, 0x2, 0x9}, 0x10, r4, r0}, 0x78) 01:26:30 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x0, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:30 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0x0, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:30 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="04f605020306af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:31 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:31 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:31 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0x0, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:31 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="08f605020306af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:31 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x4, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3800}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000040)={'sit0\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x4, 0x20, 0x80, 0x5079, 0x0, @empty, @remote, 0x0, 0x80, 0xfeb7}}) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1, 0x3, 0x0, 0x0, 0x0, 0x30, 0x10}, @ldst={0x0, 0x3, 0x1, 0x5, 0x1, 0x1}]}, &(0x7f00000000c0)='GPL\x00', 0x5, 0xf5, &(0x7f0000000440)=""/245, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x6, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x9, 0x0, 0x5000000}, 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={0x5, 0x1, 0x100, 0x7}, &(0x7f00000006c0)=0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x5}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xc, 0x2, &(0x7f0000000080)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0xfffffffb}], &(0x7f0000000180)='syzkaller\x00', 0x6, 0x90, &(0x7f0000000280)=""/144, 0x41000, 0x4, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0xa, 0x3369, 0xff}, 0x10, r4, r3}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x16, 0x4, &(0x7f0000000140)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x2, 0x2, 0x0, 0xa, 0xfffffffffffffff0, 0x8}, @jmp={0x5, 0x1, 0x6, 0x5, 0x0, 0x18, 0x8}], &(0x7f0000000180)='GPL\x00', 0x6, 0x96, &(0x7f00000002c0)=""/150, 0x100, 0x1, '\x00', 0x0, 0x1c, r1, 0x8, &(0x7f0000000200)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x6, 0x2, 0x9}, 0x10, r4, r0}, 0x78) 01:26:31 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000180)="97acb67647472a518415fc6c2b6a378ce5", 0x11, 0x1}, {&(0x7f0000000340), 0x0, 0x2}, {&(0x7f0000000380)="6e0a62b0262ef19f84e6ee8221256d52475a7765c5c872c8c259d4a15c3b183834290883179a1c3b3fc2e85de25a6ce786", 0x31, 0x4}], 0x300000, &(0x7f0000000580)={[{@shortname_winnt}, {@rodir}, {@rodir}, {@shortname_mixed}, {@uni_xlateno}, {@shortname_winnt}, {@utf8}], [{@smackfsdef={'smackfsdef', 0x3d, '+@$'}}, {@euid_lt}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY'}}]}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) creat(&(0x7f0000000340)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(0x0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) sched_setattr(0x0, &(0x7f0000000440)={0x38, 0x3, 0xc, 0x7fffffff, 0x10000, 0x0, 0xfff, 0x100000005, 0x8, 0x100000c3}, 0x0) 01:26:31 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:31 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:31 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="10f605020306af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:31 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0x0, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:31 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:31 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x17, 0x7fff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x80) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) getrlimit(0xd, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x1f, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x2}, 0x4000, 0x0, 0x80000001, 0x6, 0x4, 0x3d9, 0x0, 0x0, 0x5}, 0x0, 0x8, r0, 0x9) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="7ffe837e154c2a50d8508f02b0454464060039a59434c80a006a0a2000"/52], 0x3c) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000000)='0', 0x1}, {0x0}], 0x2) fallocate(r4, 0xd, 0x9, 0x7) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) syz_open_procfs(r1, &(0x7f0000000380)='task\x00') execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:31 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03e005020306af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:31 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x0, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:31 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:31 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:31 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x0, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:34 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, 0xffffffffffffffff, 0xa) r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) getrlimit(0x6, &(0x7f00000000c0)) write$binfmt_elf64(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c66020000000410004000c4a400030046087a894f5722d8c4a80c0d3dad82f30000000000000000e9c91404822f8191c6099a45ca51289d2ec9b61856a2240d370e57ba08478250e5c9d6ee93edc3e519fc538b0b38c50d660cb8a4a54193f254a0ef05d6c41091deabb60b97af079377aa366d17d3275213bb67ec2cc63f38468e1157cd05556ace1d563658ed7d894205ca94ff34d5a87d853967938a4facc541e400"/192], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r0, 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x10080, 0x22) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:34 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f604020306af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:34 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x0, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:34 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x0, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:34 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x0, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:34 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x0, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:34 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:34 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f606020306af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:34 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) writev(r2, &(0x7f00000006c0)=[{&(0x7f0000000000)='0', 0x1}, {0x0}], 0x2) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x800, 0x5}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r3 = gettid() r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000080)=0x7, 0x15) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r5, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:34 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x0, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:34 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x0, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:34 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, 0x0, 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:34 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x0, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:34 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4602000800000000000000a40003003e080039a59434c80a00100a2000d315820000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x12) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:34 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x0, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, 0x0, 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:34 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60b020306af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:34 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, 0x0, &(0x7f0000000400)) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r2 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) clone(0x20024000, &(0x7f0000000080)="7f4a042b88016bebd82d962c08ac4b8d841efc6eff983e2bade7af", &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000000440)="2a505ea534445d6445a0c2e9b7ac75cafc6204b4e2161df98aba919ce42e3a36caf4238f473b49bb5911d7e29677ea3180d811906a7ae27b38f08408b9eccf57a6473926775679122fc6208642e417b4ec9661ffb83ff1a344f5a26698887f761e38d8d057158569f70e4706ab40f9edfee49ce0117374fc28188bcb543ca38ca173ba415d171354ad8fae80c3bf69e694460bdd09c054592d84440e250b56310c2990f3a3ab1ddae066f46326995491dd4072e51521") write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) splice(r1, &(0x7f0000000340)=0x1, r0, &(0x7f0000000380), 0x400, 0xf) ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:34 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x0, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, 0x0, 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:34 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x0, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:37 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:37 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x0, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:37 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f610020306af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:37 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x0, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:37 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:37 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x800, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x1, 0x101}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) prlimit64(0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) mmap(&(0x7f00000ea000/0x4000)=nil, 0x4000, 0x3000006, 0x10010, r1, 0xef16d000) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4602000000041000ff03c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) lseek(r3, 0x3, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:37 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x0, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:37 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:37 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x0, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:37 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f621020306af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:37 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x0, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:37 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x0, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:37 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) setrlimit(0x4, &(0x7f0000000340)={0x2, 0x6}) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000c4a4caff7f3e080039a59434c80a02000a20000000000000000040000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x9, 0x40, 0x4, 0x5, 0x0, 0x40, 0x40008, 0x5, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xdfb, 0x2, @perf_config_ext={0xffffffff, 0x6}, 0x2025, 0x3ff, 0x4, 0xd, 0x9, 0x9, 0x3, 0x0, 0x80000001, 0x0, 0x7}, r1, 0x1, r3, 0x8) sched_setattr(0x0, &(0x7f0000000380)={0x38, 0x3, 0x42, 0x5, 0x800, 0x5, 0xffffffffffff0000, 0x2, 0x8, 0x2}, 0x0) 01:26:37 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x0, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:37 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x0, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:37 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x0, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:38 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x0, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:38 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:38 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x0, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:38 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:38 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f625020306af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:38 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfb0fb93485563bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000c, 0x12, 0xffffffffffffffff, 0xfffff000) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x0, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9, 0x0, 0x0, 0x2}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f4500041000000000010000003e080040009434c80a0010018000000000000000001000000000003ad6d03f40f43336fe746e1dd6af4564bbf12d7f1a28bfd18bbf12820d6c5f9ab1c161f4643fdc55299d585cd9e9174f22dff680f5c3f4041674"], 0x3c) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000080)=0x0) sched_setattr(r3, &(0x7f0000000100)={0x3e, 0x0, 0xe81dde4ba8d7ff2f, 0xb, 0x9, 0x3, 0x1, 0x1, 0x4, 0x6}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x10002, 0x20) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:38 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:38 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:38 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:38 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) r3 = getpid() sched_setattr(r3, &(0x7f0000000080)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x0, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:41 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x0, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:41 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:41 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f641020306af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:41 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:41 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:41 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x900, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) setrlimit(0xa, &(0x7f00000000c0)={0x4d}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4602000000041000400042c0eb42003e080039a59434c80a00100a20000000000000000000f11ffde062541dfc33b775c740630a991e23dc2462d10a08c199437c221ffe872d67d872c027c28c87e3572950b2eed56778a2570ba392c9bfafed3648ec6eb92355cb16f7656b1adb90fc20bc5d3440b44741bee05d8a8e475a3560de7addc4d6d3b62029"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) setrlimit(0x8, &(0x7f0000000080)={0x80000000, 0x400}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:41 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:41 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:41 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:41 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605030306af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:41 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, 0xffffffffffffffff, 0xa) r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:41 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:41 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:41 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r0, 0xf505, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9, 0x200}, 0x0, 0x8, r1, 0xa) r2 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000340)={0x1, 0x80, 0x35, 0x3, 0x9, 0x1, 0x0, 0x4, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x8, 0x1, 0x1, 0x3, 0x2, 0x8, 0x0, 0x8001, 0x0, 0x8}, r1, 0x0, r4, 0x2) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4602000000041000400079a40003003e080039a59434c80a00fffffff70000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f00000000c0)=0x8001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:41 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, 0xffffffffffffffff, 0xa) r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:41 executing program 2: tee(0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffff7fff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xd}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) sched_setattr(r0, &(0x7f0000000180)={0x38, 0x0, 0x0, 0x0, 0x4, 0x5, 0xfb, 0x0, 0x4000000, 0x2}, 0x0) recvmmsg(r1, &(0x7f0000000200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500)}], 0x1, 0x5) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x8, 0x0, 0x6}, 0x0) r4 = gettid() r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2001, 0xd2710, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffa394}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7eda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x200000000011, r6, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r6) dup2(r6, 0xffffffffffffffff) r7 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) readv(r7, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1002}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0x200017ec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 01:26:41 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:41 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:41 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, 0xffffffffffffffff, 0xa) r0 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:41 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:41 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605040306af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:41 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(r1, &(0x7f0000000080), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:41 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, 0x0, 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:41 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0x0) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:41 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:41 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, 0x0, 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:41 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605060306af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:42 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, 0x0, 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:42 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) setrlimit(0x7, &(0x7f0000000080)={0x9, 0x101}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="63454c46020000000410004000c4a40003003e080039040000000a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x5) tkill(0x0, 0x34) ptrace$cont(0x7, r1, 0xfffffffffffffffc, 0x8) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) sched_setscheduler(0x0, 0x3, &(0x7f00000000c0)=0x40) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:42 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605070306af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:42 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, 0x0, 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:42 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:42 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0x0) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:42 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, 0x0, 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:42 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0x0) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:42 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:42 executing program 3 (fault-call:9 fault-nth:0): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:42 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:42 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:42 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, 0x0, 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:42 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x4}, 0x4000, 0x0, 0xffffff01, 0x6, 0x2, 0x3d9}, 0x0, 0x8, r1, 0x0) r2 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prlimit64(r2, 0x9, &(0x7f00000000c0)={0x10000, 0x80}, 0x0) r3 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a4829eeca8600726f09434c80a2000000000001f000000000000d966326ac37b9090bfe3aa1e54093a1fdb3ede9db3613f885aa90451fb8d91f3fde164f39f7e5dac6b61bad6a7329e4ad03484748a09d801ebcf86e3079b73a41782794fdb7349299881c7adee69c40e91b8d2770656b66bcdc54c35312b838c1a85012af374da97600f4cbd532cb833f0bab901434d3b9b3387ee1e742bd2dc9787e548b56bc32df7c00453a2468b486ea090459210923aa393e8a73afc246ce6c00f9ab28bc781892e3d0884a9bdfee95d88d0d3f0"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) r4 = syz_mount_image$erofs(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x8, 0x3, &(0x7f00000016c0)=[{&(0x7f0000000540)="a3227b9478b399ae477507069668955d99d60d5bd276468fe94bb526962cbd8cfa84da292f381e90e6000b38c0b7d102c2e5acf13abb38710327cacea4dbaa11cdb2115f109676d8ef16aea455bbb0d5ab920a634f0e9b763bf7f6cc4ca03134bbd1a9422bc80a2cfc09c5ac8cb4645c49a4cdd510dab46ccbfd50388938b507a322bdbc6588c1452a70735a0908aa16b77a03a1e6e88a9d2a58bfe2a56a7e863713b248adfdaf6d51cff862fbb0fb75acff7fd4a64892214089d713e8c2c804d7d22ee58e8a67843ddef0263af437d4ab02995254cd2cf19cb3", 0xda, 0x3}, {&(0x7f0000000640)="270850f13c6cfe06817292ff10f475bc65364b64767fe9dbc3ad41b3963c0e5c6004668a85a7af356c12840d6dc6bd9471ecc1faa548031d9116e2310ade888f28131d1fa2aa2b", 0x47, 0x3f}, {&(0x7f00000006c0)="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", 0x1000, 0x8fd}], 0x10008, &(0x7f0000001740)={[{@noacl}, {@fault_injection={'fault_injection', 0x3d, 0x8}}, {@acl}, {@acl}, {@noacl}, {@nouser_xattr}], [{@appraise}, {@smackfsroot={'smackfsroot', 0x3d, '\xa9\\+.`/)'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000440)='\x00', &(0x7f0000000480)='./file0\x00', r4) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$setsig(r0, 0xa, 0x11) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sysvipc/msg\x00', 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:42 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605080306af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:42 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x8, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioprio_set$pid(0x1, 0x0, 0x2004) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x6, 0x0, 0x1, 0xdcfc, 0xf01, 0xffffffff80000003, 0xfff, 0x7ff, 0x400}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000340)=@phonet, 0x80, 0x0}, 0xfffffffe}, {{0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000640)=""/238, 0xee}, {&(0x7f0000000740)=""/98, 0x62}, {&(0x7f00000007c0)=""/109, 0x6d}, {&(0x7f00000001c0)=""/46, 0x2e}, {0x0}], 0x5, &(0x7f0000000ac0)=""/158, 0x9e}}], 0x3, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x5, &(0x7f00000006c0)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {&(0x7f0000011700)="020000000c0001022e000000020000000c00", 0x12}, {0x0, 0x0, 0x3fbfd}], 0x0, &(0x7f0000000180)=ANY=[]) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x4456, 0x4, 0x0, 0x4, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6000d303, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getdents64(0xffffffffffffffff, 0x0, 0x0) r4 = fork() ioprio_set$pid(0x1, r4, 0x6007) sched_setattr(r4, &(0x7f0000000180)={0x38, 0x6, 0x42, 0x0, 0x4, 0x81, 0xffffffffffff400d, 0x1, 0x9, 0xfffff121}, 0x0) 01:26:42 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 716.403847][ T5926] FAULT_INJECTION: forcing a failure. [ 716.403847][ T5926] name failslab, interval 1, probability 0, space 0, times 0 01:26:42 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050a0306af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:42 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 716.452714][ T5931] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock [ 716.502439][ T5926] CPU: 0 PID: 5926 Comm: syz-executor.3 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 716.512878][ T5926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.523113][ T5926] Call Trace: [ 716.526497][ T5926] dump_stack+0x1d8/0x24e [ 716.530841][ T5926] ? devkmsg_release+0x11c/0x11c [ 716.535870][ T5926] ? check_preemption_disabled+0x9e/0x330 [ 716.541704][ T5926] ? show_regs_print_info+0x12/0x12 [ 716.546914][ T5926] ? debug_smp_processor_id+0x20/0x20 [ 716.552296][ T5926] ? __fsnotify_parent+0x310/0x310 [ 716.557415][ T5926] should_fail+0x6f6/0x860 [ 716.561849][ T5926] ? setup_fault_attr+0x3d0/0x3d0 [ 716.566878][ T5926] ? getname_flags+0xba/0x640 [ 716.571573][ T5926] should_failslab+0x5/0x20 [ 716.576328][ T5926] kmem_cache_alloc+0x36/0x290 [ 716.582171][ T5926] ? debug_smp_processor_id+0x20/0x20 [ 716.587639][ T5926] getname_flags+0xba/0x640 [ 716.593287][ T5926] __x64_sys_execveat+0xb6/0xe0 [ 716.598234][ T5926] do_syscall_64+0xcb/0x1e0 [ 716.602744][ T5926] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 716.608850][ T5926] RIP: 0033:0x4665d9 [ 716.612736][ T5926] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 716.632679][ T5926] RSP: 002b:00007f7841533188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 716.641082][ T5926] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 01:26:42 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605100306af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:42 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:42 executing program 3 (fault-call:9 fault-nth:1): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:42 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:42 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x979b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="7f054c460200000004100012c587a40003003e080039a59434c80a0010f0e00a2000000000000000000006735a13bfa12d84f7458525644b5b1e7bb8c98c396fce0187163f136400a726c2a4ec704984f649227043ec"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 716.649044][ T5926] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 716.657116][ T5926] RBP: 00007f78415331d0 R08: 0000000000001100 R09: 0000000000000000 [ 716.665351][ T5926] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 716.673581][ T5926] R13: 00007ffe15520e8f R14: 00007f7841533300 R15: 0000000000022000 01:26:42 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:42 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 716.758390][ T5974] FAULT_INJECTION: forcing a failure. [ 716.758390][ T5974] name failslab, interval 1, probability 0, space 0, times 0 01:26:42 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 716.833710][ T5987] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 716.872192][ T5974] CPU: 0 PID: 5974 Comm: syz-executor.3 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 716.882598][ T5974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.892659][ T5974] Call Trace: [ 716.895960][ T5974] dump_stack+0x1d8/0x24e [ 716.900430][ T5974] ? devkmsg_release+0x11c/0x11c [ 716.905371][ T5974] ? show_regs_print_info+0x12/0x12 [ 716.910572][ T5974] should_fail+0x6f6/0x860 [ 716.914994][ T5974] ? setup_fault_attr+0x3d0/0x3d0 [ 716.920120][ T5974] ? dup_fd+0x6b/0xb60 [ 716.924201][ T5974] should_failslab+0x5/0x20 [ 716.928984][ T5974] kmem_cache_alloc+0x36/0x290 [ 716.934257][ T5974] ? __kasan_kmalloc+0x1a3/0x1e0 [ 716.940036][ T5974] ? proc_fail_nth_read+0x1c0/0x1c0 [ 716.945791][ T5974] dup_fd+0x6b/0xb60 [ 716.949780][ T5974] unshare_files+0x11b/0x2d0 [ 716.954663][ T5974] ? __ia32_sys_unshare+0x40/0x40 [ 716.959802][ T5974] __do_execve_file+0x24d/0x17e0 [ 716.964761][ T5974] ? apic_timer_interrupt+0xa/0x20 [ 716.969961][ T5974] ? strncpy_from_user+0x107/0x350 [ 716.975158][ T5974] ? do_execve_file+0x40/0x40 [ 716.979924][ T5974] ? getname_flags+0x1fe/0x640 [ 716.984685][ T5974] __x64_sys_execveat+0xcf/0xe0 [ 716.989625][ T5974] do_syscall_64+0xcb/0x1e0 [ 716.995279][ T5974] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 717.001876][ T5974] RIP: 0033:0x4665d9 [ 717.005890][ T5974] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 717.026198][ T5974] RSP: 002b:00007f7841533188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 717.034903][ T5974] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 717.042964][ T5974] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 717.051600][ T5974] RBP: 00007f78415331d0 R08: 0000000000001100 R09: 0000000000000000 [ 717.059582][ T5974] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 717.067843][ T5974] R13: 00007ffe15520e8f R14: 00007f7841533300 R15: 0000000000022000 01:26:43 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) getpid() setrlimit(0x4, &(0x7f0000000080)={0x5, 0x1f}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:43 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:43 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020406af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:43 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:43 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:43 executing program 3 (fault-call:9 fault-nth:2): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 717.487639][ T6019] FAULT_INJECTION: forcing a failure. [ 717.487639][ T6019] name failslab, interval 1, probability 0, space 0, times 0 [ 717.511376][ T6019] CPU: 1 PID: 6019 Comm: syz-executor.3 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 717.521977][ T6019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 717.532024][ T6019] Call Trace: [ 717.535327][ T6019] dump_stack+0x1d8/0x24e [ 717.539673][ T6019] ? devkmsg_release+0x11c/0x11c [ 717.544612][ T6019] ? show_regs_print_info+0x12/0x12 [ 717.550083][ T6019] should_fail+0x6f6/0x860 [ 717.554502][ T6019] ? setup_fault_attr+0x3d0/0x3d0 [ 717.559526][ T6019] ? __should_failslab+0xac/0x150 [ 717.564552][ T6019] ? __should_failslab+0xff/0x150 [ 717.569716][ T6019] ? alloc_fdtable+0x93/0x250 [ 717.574469][ T6019] should_failslab+0x5/0x20 [ 717.579128][ T6019] kmem_cache_alloc_trace+0x39/0x2b0 [ 717.584509][ T6019] ? _raw_spin_lock+0xa3/0x1b0 [ 717.589445][ T6019] ? _raw_spin_trylock_bh+0x1a0/0x1a0 [ 717.594889][ T6019] alloc_fdtable+0x93/0x250 [ 717.599544][ T6019] dup_fd+0x785/0xb60 [ 717.603597][ T6019] unshare_files+0x11b/0x2d0 [ 717.608453][ T6019] ? __ia32_sys_unshare+0x40/0x40 [ 717.613722][ T6019] __do_execve_file+0x24d/0x17e0 [ 717.618810][ T6019] ? __virt_addr_valid+0x1a7/0x290 [ 717.623932][ T6019] ? do_execve_file+0x40/0x40 [ 717.628620][ T6019] ? getname_flags+0x1fe/0x640 [ 717.633641][ T6019] __x64_sys_execveat+0xcf/0xe0 [ 717.638590][ T6019] do_syscall_64+0xcb/0x1e0 [ 717.643117][ T6019] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 717.649119][ T6019] RIP: 0033:0x4665d9 [ 717.653017][ T6019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 717.673099][ T6019] RSP: 002b:00007f7841533188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 01:26:43 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x4}, 0x4000, 0x0, 0xffffff01, 0x6, 0x2, 0x3d9}, 0x0, 0x8, r1, 0x0) r2 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prlimit64(r2, 0x9, &(0x7f00000000c0)={0x10000, 0x80}, 0x0) r3 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a4829eeca8600726f09434c80a2000000000001f000000000000d966326ac37b9090bfe3aa1e54093a1fdb3ede9db3613f885aa90451fb8d91f3fde164f39f7e5dac6b61bad6a7329e4ad03484748a09d801ebcf86e3079b73a41782794fdb7349299881c7adee69c40e91b8d2770656b66bcdc54c35312b838c1a85012af374da97600f4cbd532cb833f0bab901434d3b9b3387ee1e742bd2dc9787e548b56bc32df7c00453a2468b486ea090459210923aa393e8a73afc246ce6c00f9ab28bc781892e3d0884a9bdfee95d88d0d3f0"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) r4 = syz_mount_image$erofs(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x8, 0x3, &(0x7f00000016c0)=[{&(0x7f0000000540)="a3227b9478b399ae477507069668955d99d60d5bd276468fe94bb526962cbd8cfa84da292f381e90e6000b38c0b7d102c2e5acf13abb38710327cacea4dbaa11cdb2115f109676d8ef16aea455bbb0d5ab920a634f0e9b763bf7f6cc4ca03134bbd1a9422bc80a2cfc09c5ac8cb4645c49a4cdd510dab46ccbfd50388938b507a322bdbc6588c1452a70735a0908aa16b77a03a1e6e88a9d2a58bfe2a56a7e863713b248adfdaf6d51cff862fbb0fb75acff7fd4a64892214089d713e8c2c804d7d22ee58e8a67843ddef0263af437d4ab02995254cd2cf19cb3", 0xda, 0x3}, {&(0x7f0000000640)="270850f13c6cfe06817292ff10f475bc65364b64767fe9dbc3ad41b3963c0e5c6004668a85a7af356c12840d6dc6bd9471ecc1faa548031d9116e2310ade888f28131d1fa2aa2b", 0x47, 0x3f}, {&(0x7f00000006c0)="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", 0x1000, 0x8fd}], 0x10008, &(0x7f0000001740)={[{@noacl}, {@fault_injection={'fault_injection', 0x3d, 0x8}}, {@acl}, {@acl}, {@noacl}, {@nouser_xattr}], [{@appraise}, {@smackfsroot={'smackfsroot', 0x3d, '\xa9\\+.`/)'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000440)='\x00', &(0x7f0000000480)='./file0\x00', r4) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$setsig(r0, 0xa, 0x11) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sysvipc/msg\x00', 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:43 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x7, &(0x7f0000000900)=[{&(0x7f0000000340)="70cb9ed117faf462110403684bf32daef6fcb37ff74b3ec053a111a83fd1b34890f72cf1c51715e66efa45e5ab659a320f1f0dfb9b91809d62dd8eeae74bd0f19f12cc1d143a8d1f7d38572522c644f9de1592ea26e0327a53321fa366544c950b6ab3ca9d2d9c8450dd3a84e4ddbfa655735f9d3ea11f1e1e71169359e8e393886ca81daac836a347d83f19618ff4fc92fb08a763efea4894ca9b80dfbae97527371e3578536e2dcb4aa44175c1ad7258e89879041aaead86d8b4d2965b506201b3faa670e9", 0xc6, 0x4}, {&(0x7f0000000180)="827077d47d13fe51cd6c193f7159fd8d8aa65af4688ea9298407ac7eb1eb9ca76c01e1b5cafa93cf8fa1ade6eed2ecb228e51db90bdde537", 0x38}, {&(0x7f0000000440)="83c73361afb411904f2fd3a53d8ddc25d20b5ef6602fc7ebdb0d5ce2db10180cd9a5e98c91f5bc1c466bf5aa459a441f15909e3c67760c2f28d66d9e80dc18c2481a4916a1a49bfcf728b4b9aa292b1833", 0x51, 0x6}, {&(0x7f0000000580)="975d831899accf452e177bc70f88d7711e7375d3ff5f7eeba9d071a0978e899fbe72a47d331aa723251545e0b089c5f1a6f2fadfab2737a6f42d14351709e968b4ad27fe9f9b65ebc99107c0d6794409f65743f3b9bbd8d99545748bb11a5fbe4652a6bd51b4f74a9b7d5e673458e3034d619d779b938155c31dfc4048924f126c57cf7a0a1fb4d8571f491f6c9b3561a7ee6171338fb1d5a31bc614a156f77f8a", 0xa1, 0xcf1}, {&(0x7f0000000640)="725728d9df6d4e8426dce7dce91427b3a3aa34ab5ab2bf72c016d2dc96f337424df0e287cc52d15154f06008f52748009f06f995035efa46683ba31505583cf631aaebbd6f55c2da1123d21c1064b4e0bae24075b3f7ec8bc6beae92770c61341e0b935e14ecd51dd7b9ab550f16e15f0bbe3b799c883459e4cd44452a51430281c0a48925303e0f065bc1048f6ef607e5f27da6da2c34117717034c5a6c3826f34aaaf40f48e6277a31bf3fcb401526122b8a43e23793db93d0f33fbdb755ecc9fe10b79e606570c52e674751327f10e7d4dc758dcc8304e450dbade3e4b8198f3c503ab30156a06444a5a09493409471", 0xf1, 0xa75}, {&(0x7f0000000740)="d12696508e1ffd39d0fb9a39c39b9fc604e04bb9cdf32651cf49c8c71e009050e5146b849e8821be33fc281ed9b23170cf6a209a9237b57f8bb051597dcf05dbfdb0622829b669008d649200a72d570d90c82d3e5aaf3c87d1f5b4683ac146e6239fd79815906ff3d0c5e2cb91c8539ad364826a57954ed27e3a2248b7f8e7d2b72fb5006df1007b58c0087ede9f7e12645abaf07f69f7cdd4b1fc9edc90e374844daab80da8898d799d02e0edbca1431c80df944706d2674b8b6cccffc12701046de2bcdd369b02fb6255ac66dbf34fdfe98d28f68357", 0xd7, 0x6}, {&(0x7f0000000840)="dfd68b6d67785fc1709ace1c80c662b00b8781a110f9ed319826b9ee61295540ffaa906a269b016bea9b94c605f808d5e894b1676c0bdb3f395df7164d41f6144f9610a05daa20014c09551cab653fb99411a5a83168c4e71a71d09f54f898e3d2e64926896abaffd2ebe0329fb2cbb05fb7b1a0cb283dca0c61801879a7c7ba60a1fef8331fb0b1d816663e44398f17a923cf37c78b3cc0c41a4e8285548ba89b3031", 0xa3, 0xfffffffffffffffa}], 0x0, &(0x7f00000009c0)={[{@huge_within_size}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x6b, 0x36, 0x37, 0x30, 0x3e]}}, {@mode={'mode', 0x3d, 0x9b}}, {@gid}, {@huge_always}], [{@seclabel}, {@fowner_gt={'fowner>', 0xee01}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\\-[#\x1f$-*,\\:$/'}}, {@measure}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type={'obj_type', 0x3d, '\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY'}}]}) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:43 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:43 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020806af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:43 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:43 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:43 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:43 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x101, @any, 0x8000, 0x2}, 0xe) ioctl$FS_IOC_GETFSLABEL(r0, 0x541b, &(0x7f0000000100)) bind$bt_l2cap(r0, &(0x7f0000000200)={0x1f, 0x81, @any, 0x1, 0x2}, 0xe) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x220200, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) ioctl$BTRFS_IOC_INO_PATHS(r2, 0xc0389423, &(0x7f0000000280)={0x8, 0x20, [0x8, 0x5, 0x200, 0x7], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000080)={0x7fffffff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) [ 717.681537][ T6019] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 717.689590][ T6019] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 717.697773][ T6019] RBP: 00007f78415331d0 R08: 0000000000001100 R09: 0000000000000000 [ 717.705944][ T6019] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 717.714000][ T6019] R13: 00007ffe15520e8f R14: 00007f7841533300 R15: 0000000000022000 01:26:43 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:43 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605021006af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:43 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:43 executing program 3 (fault-call:9 fault-nth:3): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:43 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 717.961512][ T6088] FAULT_INJECTION: forcing a failure. [ 717.961512][ T6088] name failslab, interval 1, probability 0, space 0, times 0 [ 717.978445][ T6088] CPU: 1 PID: 6088 Comm: syz-executor.3 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 717.992573][ T6088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 718.003878][ T6088] Call Trace: [ 718.007471][ T6088] dump_stack+0x1d8/0x24e [ 718.012122][ T6088] ? devkmsg_release+0x11c/0x11c [ 718.017336][ T6088] ? show_regs_print_info+0x12/0x12 [ 718.023216][ T6088] should_fail+0x6f6/0x860 [ 718.028551][ T6088] ? setup_fault_attr+0x3d0/0x3d0 [ 718.034341][ T6088] ? kvmalloc_node+0x7e/0xf0 [ 718.039073][ T6088] should_failslab+0x5/0x20 [ 718.043971][ T6088] __kmalloc+0x5f/0x2f0 [ 718.048654][ T6088] ? __irqentry_text_end+0x1fc3fa/0x1fc3fa [ 718.055131][ T6088] kvmalloc_node+0x7e/0xf0 [ 718.060183][ T6088] alloc_fdtable+0xcf/0x250 [ 718.065084][ T6088] dup_fd+0x785/0xb60 [ 718.069226][ T6088] unshare_files+0x11b/0x2d0 [ 718.074557][ T6088] ? __ia32_sys_unshare+0x40/0x40 [ 718.079916][ T6088] ? apic_timer_interrupt+0xa/0x20 [ 718.085356][ T6088] __do_execve_file+0x24d/0x17e0 [ 718.091345][ T6088] ? __check_object_size+0x7a/0x3a0 [ 718.097109][ T6088] ? __virt_addr_valid+0x1fd/0x290 [ 718.104087][ T6088] ? do_execve_file+0x40/0x40 [ 718.109094][ T6088] ? getname_flags+0x1fe/0x640 [ 718.116950][ T6088] __x64_sys_execveat+0xcf/0xe0 [ 718.122708][ T6088] do_syscall_64+0xcb/0x1e0 [ 718.127413][ T6088] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 718.134130][ T6088] RIP: 0033:0x4665d9 [ 718.138593][ T6088] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 718.159439][ T6088] RSP: 002b:00007f7841533188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 718.168806][ T6088] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 718.177558][ T6088] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 718.186357][ T6088] RBP: 00007f78415331d0 R08: 0000000000001100 R09: 0000000000000000 [ 718.195032][ T6088] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 718.203730][ T6088] R13: 00007ffe15520e8f R14: 00007f7841533300 R15: 0000000000022000 01:26:46 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020302af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:46 executing program 2: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0xc101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x6, &(0x7f00000006c0)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002000000000000000500000025", 0x29, 0x1800}, {&(0x7f0000011100)="ed4100000004000029c4645f29c4645f29c4645f0000000000000200020000000000000003000000ff", 0x29, 0x4000}, {&(0x7f0000011700)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x9400}, {0x0, 0x0, 0x3fbfd}], 0x0, &(0x7f0000000180)=ANY=[]) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) syz_open_dev$usbmon(&(0x7f0000000ac0), 0x2, 0x200) sendmmsg$unix(r0, &(0x7f0000002080)=[{&(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000540)=[{&(0x7f0000000240)="3f53cf23d610cfad5fa207915c6b06ba7150817f3d8b5f3377d646cba6031c1b9f0883780de1c8292d6bcbcba91c8eb6", 0x30}, {&(0x7f0000000280)}, {&(0x7f00000003c0)="4bfccbf690fe2f2fe78db46e528dd92a501d818ab0831706e54612fa56df5eb33104e863467b7ba3daa2dc807b5c77ce236682265441b24562a490c6ab79f49a4a1925fa509441b56be07685e74795f63153e4facbfa8e326ccdd34720b3b202b0639a3ea9b62944c9db3245788a1c295c8259eb1c86c353e8bf38e3827e8387a049c5f0d576630d59d51d497d55e6324d1f53d449b2381b6fb8640590eb474693ea8e19d89678b3473da02ba603898f20785561722edd9dacd1a3216293f5d967db572c294aff6b743382e9cfa8c56bc2cd41f2b5d73696d9077952582440abf0", 0xe1}, {&(0x7f0000000940)="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", 0x138}, {&(0x7f0000000780)="b24c151f727ea80620372df6603a3a755c0d6a3a0d82d5206ce3181ee9b390679fef8a51d6d050f70aa7cdfe725c6e16c3f8e1258f4a07bc9d8d702ea4a7d8ab78cda1d87cc44f35c85c486e34a42383a3273a86e8412fe6a3d326136da8929d3fdc7228dc301bbdc998c3e1c61a7e2877eb75e471ba1f969a72472d08049270c8b58c7fc21888cd661d4a978b72c2feb738f9d2b3e8e90902ab3fb8929dbd5b21a35b0af5800d29fe47f4bd0fa88ee6368d957da6847f33dc83fb2c2f187c7cbaae73e77bc43d29d2136bab79ee7f3fc722281792260952ea20", 0xda}, {&(0x7f0000000880)="38a9e4be41076892b2cb57c761ae4bb92ae92d4e4467bb9ff2a47c5d382fd415a0552027ae2926cfe60e5bc51847527c56a6e660399878f89b61ed98d6d7bf21bcf2039c8ef17ca11afa1685ecbdfab01a51f13bb4710efaad34ec97d9a5a1e7a0e0213da8e835234260e058eedd8b5b29fb55422141b525ab2c69a24451eea1d8895988a53c167899dcef95cc", 0x8d}, {&(0x7f00000002c0)="88872306126a49f354424c0b1f6646252b007b955dc71c91c4780ff4ffab26f403bd", 0x22}], 0x7, 0x0, 0x0, 0x40}, {&(0x7f0000000c00)=@abs={0x1, 0x0, 0x3f}, 0x6e, &(0x7f0000006180)=[{&(0x7f0000000c80)}, {&(0x7f0000000d80)}, {&(0x7f0000002140)="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", 0x100c}, {&(0x7f0000005180)="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", 0x7e0}, {&(0x7f0000001d80)="4c8f6b", 0x3}, {&(0x7f0000001dc0)="05374b731e1030f95cd1cb9b4a2d74b36b8444f06445229acff4672103b100ea3672e0967280d85be2a1ebfd33456ad82f1dbf4036017e1dc3c29e8c9611cf07a0a487c1eb2c772fe4468c438f2285526ea71d547f3c6cbb682d4270f5feb0e68b78222909a832ec60518f42ea3677", 0x6f}, {&(0x7f0000001e40)="29ef0825760c6583", 0x8}, {&(0x7f0000001e80)="93e6b67fcd205b2b2584b6bacdccb4d59409beda36f5e00e0252885d052a290a00f2c6ef241215adb0784c175a1e340cf81b549cd4824f0aa3e482b909754e0c6fc6744499faecaa1b54591f0fe9bd55144855788de654d15fe78c3112f3868de6d1937319823d959d1c25a16f97e0ae1e02985c1543ad02bc5fb42d60d7b5bbfe31c98814ca0ad1e8178906bc570be9cc6ce1baea926dd36ed2aee77f31c933ef4ac5d95af19c301823e6e8a22f46663ff1dbf4cc5cff7ae253facc72ac85d329559a0848cfc63e26bafad976cc64a03d5524e9b0e7c3dead688161578cd8eba070c1c7a2150ff0b726a00be6a81cb00495cc", 0xf3}, {&(0x7f0000001f80)="0ad3058fd56fd5e6cae9444223ebf990a9e3bde5989b459ae24b8a1d6f52b307eae77e1def1cdf2cf51ab9fa6cb425f429f5fe27641ec0f62b33452cb3974a214b22506e4002a10ae0b893f6b0643ec9e9f6110c87db713681fce374d7811b31522c8d1dcc7f6e528879713c50a38157f7a8e2b64d37c0aaf0fc2e7f955ea64215715f1ddcf6677b64d4d3b814bcf31ebe8733d35f052ce861671c7fbd004ddc3f27042f978e61dd3edf66828e4a105dd305edc0d86233d341ab5b3462c148be5c3a5756137c", 0xc6}], 0x9, 0x0, 0x0, 0x11}], 0x2, 0x80) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mkdir(&(0x7f0000002100)='./file0\x00', 0x28) unlinkat(r1, &(0x7f0000000100)='./file0\x00', 0x200) symlink(&(0x7f00000000c0)='./file2\x00', &(0x7f0000000300)='./file1\x00') dup(r1) rename(&(0x7f0000000040)='./file3\x00', &(0x7f0000000340)='./file1\x00') 01:26:46 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:46 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:46 executing program 3 (fault-call:9 fault-nth:4): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:46 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) sched_setattr(r1, &(0x7f0000001740)={0x38, 0x6, 0x10000044, 0x101, 0x6c5, 0x80000000, 0x2, 0x20, 0x2, 0x80}, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000000)='0', 0x1}, {0x0}], 0x2) preadv(r4, &(0x7f00000004c0)=[{&(0x7f0000002880)=""/182, 0xb6}, {&(0x7f0000000340)=""/94, 0x5e}, {&(0x7f0000000580)=""/4082, 0xff2}, {&(0x7f0000000400)=""/137, 0x89}, {&(0x7f0000001580)=""/139, 0x8b}, {&(0x7f0000001640)=""/213, 0xd5}], 0x6, 0x7, 0xa1) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) vmsplice(r0, &(0x7f0000002840)=[{&(0x7f0000001780)="01edd51b2f406e0d8a7c005b6846b95cc27c6e845d08f8483113733f5768969d01dd05ce262421b4a18185e49c60795e6912f5f1264f2a3794b663ca1f6ffbd8087fd46ebc317b758ff5eaa617b898b542f0af68f8d0065860fc03cde818dd2649ca48dcc9243bdb36848de0a0f9ac0cebdb048f85079280dc1423f73b476761b2a884241091b438174f14040de4bed9fcbc638fb6f340373a8fe106d77c885e00079fdc30206cc1bffc606a07e609a887174c", 0xb3}, {&(0x7f0000001840)="198807469f49a1f0a55f6ad11171c154b0ee7334fab0ef77164ad48c8d15e2eb8ff3aeb5737f02171b7d31e986c00d675b7027997bc1b3a8873f579094c2bee888936a6946f80e6154e36234ce07066870c9193b5821b03e5cbf880c455ad5d1d58d63a7e47876763d0b4e5a48cd8acbc42f986fcc1786b2c54c38612e771dd067af70792a2061b1305ea454b1cbda59ee4270d05eb1cbfa306290cecfd896672f5a485f3c9f6ab7a47e2d6632f9125ce7b99a8019242129c5b13ab0e23e02461edc576cbf4df016c780020860f46edf5a2b15b5b1c40d904c8c912c5287666667d9ac554ea3e3d4b39c89b21a54f971daa4ec1a2a44c2938677d77933384a59a3afbc01f51b199f8b37939146eafd7b23dc65226ce80c67c23eb52ffd5fb412795a1180bad2a454d76efe835c8581a7697ae17e3e77ed8e5c7253fe0a2dc4777ac7886900367fb16ca44da9a30dd6494db7c9b92b95a6f28142d22fccac338fff592652dfb5730e6bbfa050f7b509a51a940cf8aed63ac4e8f0d6a0681b42bd6b0004a2c1e7fb7c8907e7089f8834a31739fcc2fd67e28bd81f90d80a6c0570921c4a3f4c9e8016ae315065e9ff180475bad649bba5e6241367fa9ceb90010aa518cc0dc0708db8c7c78f3f7f096223fbbf5ddd505cad69743092f8fa86449917efe17980d1330968550b659a0eb8e2dcf7ce96fc655b7b8af68d391b1225ffc93aa0efe8135da0bad0412056fc5c8634d93449e19615c6ab76139821ccf18ffbfff08819a73074c875e639530df0694a91aa2585c8b7632dd42a62131279c2dfa40ac38416f475ed5c7af3db3b4e313839c4e8d4081d8859f4bb991156f2f0d254fd6903cd864b51eb13e4a18d01e37e738e2102ce2c8a593f4c2d65d9a19998c8498077b1ed56421ada5c6075829d2e92998063749082bce0977cca5e70bd3682a342bb0cc9366e3b535fdf11d47639ab57a361fcdcdcd6373e95c0bfd0ee91d961bbc1311b242f61c14369765cc5393d88982546225204ff29beb79cd9c9d36b3988feb20edec8198444c4d4e032db88bf402a4ccb646cf823db3e3176e83c24560a36661c00fab75cbf332d6e0cb863bab914093c2352f581245f58437a628c46f497d2acdc47ae7f738d90ab4cbb11b5a24c27377c0059a239c1ba745842f6e6f9c9689d6bffb78644b60c835366cbbf340746aa7bedc5d6ad2b2594f1e0f43bb904eda7a8c0ec8602840fd115cc3777695110344889061a1043569f7a3e8ff449f3a72304f858c3a8b3e6810b147a4788f8653f4ac99518e48a25ecfc65b6fc9ab7e325fc2709893b89a0a7be74ff3ccfd761fe4a79416a1f0b12a0d4d060fd3658d40b489c7687354bca65eb829ed20f91fcf6041505022a5eac33c7c63edf498020c3ac5aec08c946ec3ff103cf2e36efe03ee7fd59f18fb0ca45724f26c70cdfab637a95bc5e0dda5736eba2136e12af1d8a3068f55348503438142585717a2aa1c103ebe134002dc17c3e3ac06a9651453b210cdaa779f9d229c33c9d8a36738030a0d10cbf3d47799c514f118ce25e24e427618cf1a157dc0b4d8d07baa74865e7654b2fe52caa87acc9cb153e1d5019b4521ed385a7ce769ecd15bdc091118184fdbe6f406e1e33bfea0ce9b47911aa0b50d822bad6bb2ca960af1e3dcc9fecdb2da74389f320d9562536299ed0a2d46c7ef0e2a39b917b907a137269409c5eac4f368c250cad0cf61e475e810005855e6488e8a4ec0fec63fdb3cc1f4ac17e52381eef62639fe149625a60bf43be10a3808df268d227b7a97673a712e943b917ad2251b8d1a085417f1da6ca2808bc8739b2d4521ecdab45c8c403ce2f44cb41b9922a38bdbeacfa7151ad1e96c14df4c60314a0ec9d078b4faa744868495f23043b911f6c4ed905054bfbdeb5833fe49c98f5e8fd6ebe61d976a51cc3497b25dedfbe4c24cfc6e8c4b048c0ceb18488395acd534484ed020e561109d5effdf6fc019e4613377ac25adeca5f0db848fe845660a90128938b02e0f2e27de1af160a085f6771e23f7f0f2b6e5345134a67c8f27df0b419b4ca371a72e3a3be497c2c6b77e427aa63915db18adcba50d0a73556519d68624c8734ad3ba774a8288957bc4b9157d390f87778fb5417af01c81cce37d4ed888cddaf1957fa7627e30dca89172df172cf751e76af76e94b410390ee8d70c3e3405911df1add22fd140424b039099de83296c86696135f2c3acf57bf94549769f274c1b031f79eb685f94eb30bdde6d8dcf88f1ed9ab38498746215d2c20cf36944b542b1307bd60e6b97a59f703c355a4a903ece4b8cce0d3ac8ed333069c5907da0e4921c2ea707388731b8fcd8106012c3dcfc1a85a1a2b1f03d6a81840e6603dfef76901d28de9e9d091169df07bc4e4db146dd541a2c6d67797fa01bf4ded8c0d16e6169baafaafb3f7d8aa9b3cc67e964d588f33bc739c9b00f11eb39d4931a61a721bee3cd4cd65a597bfbc9c2236931e62b4b91fb379617977214d837cf1a795b6c7f4048a2e705f572bf4c6dfb214d8b8289c4a9362fead2cb3be6d03498891dfef1247f7913a1d14991ed0da5fa16f601be2a75c798c0c5426188a4b304a9485e1d4dd7e73ee4722f7f478b354cf216f75b5ae5a0586411bde049e82536c3630c3eef16035697215fdc055781368faf63c1079e8206b4eab15d06e9a6c6e06ba13fc97228d3eb80cf0c54954792bbc67b88437643a8c88bb7b6a889150d7b11729f1b93e2f5a94f5146719eb6689fad61e8412728582c579140caedc9e5a8030301ebcc8a5b536e31ed08536b23d55d7b4c72033330a804b1d2f883ed5d5a7562e7f31b26f9d3a4705562d60a41071797fd4373b5924c64e99e74f2825178600e0966835be82c0e1e8038c038c1c16e9fbda3e6c5320ed500c45a99117cc86bc5be7e5c7c0ce7592545d22fe60fb136e9a3fe3ef2de88bba7cfc6a580e0cdc17d5c30b30b335d79eacfaa982c3a846e99d90d6a69a42251c0f808156626e271be59c99bb248f9e6e0d51d413a0c91cad1a0e2ff5f023f6e3d8e101af89f283d8183a257d0cd1a55849fe030562d3051a193f3667794dd20da359b7be15295db3066e0a31b3ed9865a2544781216fb05c507379005f8c86b5c54bfb653f929d02937e6acbeddf79c93c69b058e08a3e39fc10f2695779e93d8078d75f44fb5f18c1243ba8a64e9a4ecc2330b57ba4964fb149aa50b546465287ebb76a5e9c79734c0dbd200bea3a633f14ac330339855c41835c3fad557cc1a035f11911a3022c84a6d5ee204bf998eb480b2827642516f0175a8163c1bf9345f1a753a57a6d2f5cd714b154d37f4a77191ea1ec2d6e90d1f57785922dadf8eb2f769a2a595f0ddda21b0416fa995010d65f336a3b264fb73030fbb9d2bc512d7a541d9c32a80cc06205c12f0d389001a9bb6050f9539fbac0969e0a1926cb71d44a3350f759e6eff7bea956c06fca021c0c0c8e3799d268b4c80fb8f408766a40d69aed579f734a41d3ae69d1a184751bc30ece3a88d9120c678b373b8a8e99ab031dc7e745523594337fa70f85d902cacd518b0063179df98975352e0a16b955b5818c2dbcbf406b88d9aa4a3c5bbaa1d61df4597297f75e7f43a2d1644f6feef14a8d8469b67afe4b01f5e3399b92256ba356667ab7f4a4d908f8a19716c87486e0fdcebb549521caca1f9d08c4ea72524b6317f4ed0393126dd51a211832c64143b9722d4f26392a3507530e95fc783302b740425be81c0e6f25044ba695ba6777fff1f781369df8f1ca2f6510af5079b519afa0434ca35132a9bac8b58c6b01ca6d2c102962c6f149d4e2b7d2c61a560ddc96e0f777c59e59eb7bdc7f4a83726f7ab5527f6f0170ed9e566315c73e5477640a05ba817a37c4d260b47a6677ca4d015212a014378a735cdd94d48d9db166f1cc015f926bfcaccc7a1d2933b988e27be8b36986a72a3d62cd94ac6a00d7d6f03c890c32ba6be76631ff01a7b50716af915b0516622a6c221b9aa0b82047d1d5ccbd66c66c67a27bde20b9136a85b09eb67f3cdc2f4d805793ef633af8290284931d6c9e3f72801165f08fafa1ddb1e8dd8a41fac1b41d57107e612ddff9457c3ecf6fd28378d88a8314afcbed9144a6ba6cc601bd0a2eba1e9d36eea1e28fdc2507e799911f5bb289c2aa0256a31f3086defd1a6054a60628053fceab0dedf7dcbde11eda4b837781dba3023cb581663ba4be9992cab55485cced55aab6ddaaa0040ab09ffd2ac05aa790901c5cf0a90d16c51d863c66d10af0b52421d81a4655f1cd61aad6958c82a906a8d7d0025d4bb3f0565015526d3c441f463fc5161914bb1c1d4fb6e3316b44ffed419bc52e90afd44e0668d5b908b6751d6ac4d551376b6e127ded62a8adaa334cbc3e0eb91a1ef2fafaec0fb201b72384e0bb10b001cd1c3666a482af62a9a8b9ef7ab52f41535ed826191cca4dc0aa3186bed10a5a7582a0790556eebb5fee501e2987cae6f4496e1d856ebcc31fa7d53691e8ab2072616bdbc603cf513565ab7581e05d97799c09635c3ef9ba4ead1d54a207372573e2912ccd29c12741380510eec660252be41b490f52d68516d71c353f6cc1a9978ddaa801efb99f2b62a8bd21b6cfa1213ba8a891c759256b56e10ad175a04a5062686eb9e5219abf7d2126ec4547577e549352f4aa7744546f20fee4ad993e422ab5f5aa01cd4abb8ea2b8ae40cb6c932a1e8e3c553995810b3d41b8ffcf334a304f85ca3a356e831cece7b8c62864d87fa69df14a403d8137d1fd2330dbba79b05ef6a6b989cf2aeadc0cc336f9646b53c361a30750430e14a991c66af2b94d8618440d804eca4f6760389d6e63655f8ce4cbe62871895c180e97f0ff53874cbbb6d5c0004cdd7d32115ae72f9e2a5c4e90b85c1e96bfb56f5ed47706737b0417dc7be46da3ea4afe4efb058ae4c1666ea4454a253a3f896e17ff556a053094fd67942199d6eb35e1c5ae7ae5272e6f984be4d7bc0e56d61a038a4cfedbd688bbccc70444511ccf6dad842902fc7f486bc2bc15bf0e26da8e282f14e32105399d2edfd56b2b52e856acd6804be93dfcdbbd7faafe879a381139589659e0d07743ca1cb9fcb0e02611289a32620de5f868b78beb9c452623a73ec402fe1c1a31392a7c327dcde943290ea1ff807b8fabd001734914f5ceee702aa223dd4ab48189a27a44d5739443fc554456f4faa18d9b8c8119c788043f6cd2250eeea5cfd47209d12d8fd51cbca8d44da5a919727a47b5a3e5730104000113cc6b98316c4693b4353b0b8040676f5fd88aa747c7dadc3df597afba64957b840dcd10e45a4307e8aa9b39e1992dd98d41871f51f979031bec02de5df5930b1856962506998fdb7411e8a70e44bb818f856aaa955473921e2805feffa0c9edc2508c60277062d99890e6d6e74f5fe09e16f575094ce955e63e32acf14229048ceb4341f580cbd784bf6f639db2fce0ce5b0f65fa020c1fec5ce413221b37071bfa10d2ad5d4761d671700d3704a345cd2a0a4a569b6fc58b1e26a9c222586428f34f98bfbdb961c5ab75175fb15d9129d9e2ef4adedfa017dfcf7d6af4a0803d0d44262845d2dd2157bc4e350b212c548aeb36527e4e7a0ffb1c6dcc57538da6f77d81639322d83e5c5c6e432ceedd0ed70364fd9cbf09f4583d8c4f8f54110025427c60954df3204b75e6790accf5b3227b307544e627d2ced20dc23db13c707d40daa79db530d9dced4fbbdb28a465ff86354f63", 0x1000}], 0x2, 0x7) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:46 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:46 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020305af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:46 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, 0x0, 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 720.688345][ T6101] FAULT_INJECTION: forcing a failure. [ 720.688345][ T6101] name failslab, interval 1, probability 0, space 0, times 0 [ 720.749955][ T6101] CPU: 1 PID: 6101 Comm: syz-executor.3 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 720.760235][ T6101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 720.770455][ T6101] Call Trace: [ 720.773921][ T6101] dump_stack+0x1d8/0x24e [ 720.778459][ T6101] ? devkmsg_release+0x11c/0x11c [ 720.783459][ T6101] ? show_regs_print_info+0x12/0x12 [ 720.788706][ T6101] should_fail+0x6f6/0x860 [ 720.793558][ T6101] ? setup_fault_attr+0x3d0/0x3d0 01:26:46 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020307af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:46 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020310af54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 720.798626][ T6101] ? kvmalloc_node+0x7e/0xf0 [ 720.803306][ T6101] should_failslab+0x5/0x20 [ 720.807814][ T6101] __kmalloc+0x5f/0x2f0 [ 720.811980][ T6101] ? kvmalloc_node+0x7e/0xf0 [ 720.816582][ T6101] kvmalloc_node+0x7e/0xf0 [ 720.821188][ T6101] alloc_fdtable+0x146/0x250 [ 720.826049][ T6101] dup_fd+0x785/0xb60 [ 720.830432][ T6101] unshare_files+0x11b/0x2d0 [ 720.835022][ T6101] ? __ia32_sys_unshare+0x40/0x40 [ 720.840251][ T6101] __do_execve_file+0x24d/0x17e0 [ 720.845185][ T6101] ? __virt_addr_valid+0x1fd/0x290 [ 720.850469][ T6101] ? do_execve_file+0x40/0x40 [ 720.855144][ T6101] ? getname_flags+0x1fe/0x640 [ 720.859908][ T6101] __x64_sys_execveat+0xcf/0xe0 [ 720.865051][ T6101] do_syscall_64+0xcb/0x1e0 [ 720.869647][ T6101] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 720.875715][ T6101] RIP: 0033:0x4665d9 [ 720.879871][ T6101] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 01:26:46 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, 0x0, 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:46 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r1, 0xa) r2 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0101000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000580)=ANY=[@ANYBLOB="3000000024001d0f000000000000000000000000dd1d164cfed69e22dcf264c0adc666756d7fc8d043ca952757f6e144c196f7c37d673d24317a262ea521", @ANYRES32=r4, @ANYBLOB="00000000f1ff90f70f79ebf1f913eb29ffff000000000c000100696e677265737300d95535a04ac48d532d43e50cc59bdb51b04d46aa12b55104bce93971e5f970136e28ed3d11"], 0x30}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0xa, &(0x7f00000000c0)={&(0x7f0000000500)=@delchain={0x34, 0x2e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x0, 0xffff}, {0x0, 0x4}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x4}}]}, 0x34}}, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000440)={0x70, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x4008840}, 0x40) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 720.899654][ T6101] RSP: 002b:00007f7841533188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 720.908421][ T6101] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 720.916763][ T6101] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 720.925206][ T6101] RBP: 00007f78415331d0 R08: 0000000000001100 R09: 0000000000000000 [ 720.933461][ T6101] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 720.941513][ T6101] R13: 00007ffe15520e8f R14: 00007f7841533300 R15: 0000000000022000 01:26:47 executing program 2: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0xc101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x6, &(0x7f00000006c0)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002000000000000000500000025", 0x29, 0x1800}, {&(0x7f0000011100)="ed4100000004000029c4645f29c4645f29c4645f0000000000000200020000000000000003000000ff", 0x29, 0x4000}, {&(0x7f0000011700)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x9400}, {0x0, 0x0, 0x3fbfd}], 0x0, &(0x7f0000000180)=ANY=[]) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) syz_open_dev$usbmon(&(0x7f0000000ac0), 0x2, 0x200) sendmmsg$unix(r0, &(0x7f0000002080)=[{&(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000540)=[{&(0x7f0000000240)="3f53cf23d610cfad5fa207915c6b06ba7150817f3d8b5f3377d646cba6031c1b9f0883780de1c8292d6bcbcba91c8eb6", 0x30}, {&(0x7f0000000280)}, {&(0x7f00000003c0)="4bfccbf690fe2f2fe78db46e528dd92a501d818ab0831706e54612fa56df5eb33104e863467b7ba3daa2dc807b5c77ce236682265441b24562a490c6ab79f49a4a1925fa509441b56be07685e74795f63153e4facbfa8e326ccdd34720b3b202b0639a3ea9b62944c9db3245788a1c295c8259eb1c86c353e8bf38e3827e8387a049c5f0d576630d59d51d497d55e6324d1f53d449b2381b6fb8640590eb474693ea8e19d89678b3473da02ba603898f20785561722edd9dacd1a3216293f5d967db572c294aff6b743382e9cfa8c56bc2cd41f2b5d73696d9077952582440abf0", 0xe1}, {&(0x7f0000000940)="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", 0x138}, {&(0x7f0000000780)="b24c151f727ea80620372df6603a3a755c0d6a3a0d82d5206ce3181ee9b390679fef8a51d6d050f70aa7cdfe725c6e16c3f8e1258f4a07bc9d8d702ea4a7d8ab78cda1d87cc44f35c85c486e34a42383a3273a86e8412fe6a3d326136da8929d3fdc7228dc301bbdc998c3e1c61a7e2877eb75e471ba1f969a72472d08049270c8b58c7fc21888cd661d4a978b72c2feb738f9d2b3e8e90902ab3fb8929dbd5b21a35b0af5800d29fe47f4bd0fa88ee6368d957da6847f33dc83fb2c2f187c7cbaae73e77bc43d29d2136bab79ee7f3fc722281792260952ea20", 0xda}, {&(0x7f0000000880)="38a9e4be41076892b2cb57c761ae4bb92ae92d4e4467bb9ff2a47c5d382fd415a0552027ae2926cfe60e5bc51847527c56a6e660399878f89b61ed98d6d7bf21bcf2039c8ef17ca11afa1685ecbdfab01a51f13bb4710efaad34ec97d9a5a1e7a0e0213da8e835234260e058eedd8b5b29fb55422141b525ab2c69a24451eea1d8895988a53c167899dcef95cc", 0x8d}, {&(0x7f00000002c0)="88872306126a49f354424c0b1f6646252b007b955dc71c91c4780ff4ffab26f403bd", 0x22}], 0x7, 0x0, 0x0, 0x40}, {&(0x7f0000000c00)=@abs={0x1, 0x0, 0x3f}, 0x6e, &(0x7f0000006180)=[{&(0x7f0000000c80)}, {&(0x7f0000000d80)}, {&(0x7f0000002140)="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", 0x100c}, {&(0x7f0000005180)="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", 0x7e0}, {&(0x7f0000001d80)="4c8f6b", 0x3}, {&(0x7f0000001dc0)="05374b731e1030f95cd1cb9b4a2d74b36b8444f06445229acff4672103b100ea3672e0967280d85be2a1ebfd33456ad82f1dbf4036017e1dc3c29e8c9611cf07a0a487c1eb2c772fe4468c438f2285526ea71d547f3c6cbb682d4270f5feb0e68b78222909a832ec60518f42ea3677", 0x6f}, {&(0x7f0000001e40)="29ef0825760c6583", 0x8}, {&(0x7f0000001e80)="93e6b67fcd205b2b2584b6bacdccb4d59409beda36f5e00e0252885d052a290a00f2c6ef241215adb0784c175a1e340cf81b549cd4824f0aa3e482b909754e0c6fc6744499faecaa1b54591f0fe9bd55144855788de654d15fe78c3112f3868de6d1937319823d959d1c25a16f97e0ae1e02985c1543ad02bc5fb42d60d7b5bbfe31c98814ca0ad1e8178906bc570be9cc6ce1baea926dd36ed2aee77f31c933ef4ac5d95af19c301823e6e8a22f46663ff1dbf4cc5cff7ae253facc72ac85d329559a0848cfc63e26bafad976cc64a03d5524e9b0e7c3dead688161578cd8eba070c1c7a2150ff0b726a00be6a81cb00495cc", 0xf3}, {&(0x7f0000001f80)="0ad3058fd56fd5e6cae9444223ebf990a9e3bde5989b459ae24b8a1d6f52b307eae77e1def1cdf2cf51ab9fa6cb425f429f5fe27641ec0f62b33452cb3974a214b22506e4002a10ae0b893f6b0643ec9e9f6110c87db713681fce374d7811b31522c8d1dcc7f6e528879713c50a38157f7a8e2b64d37c0aaf0fc2e7f955ea64215715f1ddcf6677b64d4d3b814bcf31ebe8733d35f052ce861671c7fbd004ddc3f27042f978e61dd3edf66828e4a105dd305edc0d86233d341ab5b3462c148be5c3a5756137c", 0xc6}], 0x9, 0x0, 0x0, 0x11}], 0x2, 0x80) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mkdir(&(0x7f0000002100)='./file0\x00', 0x28) unlinkat(r1, &(0x7f0000000100)='./file0\x00', 0x200) symlink(&(0x7f00000000c0)='./file2\x00', &(0x7f0000000300)='./file1\x00') dup(r1) rename(&(0x7f0000000040)='./file3\x00', &(0x7f0000000340)='./file1\x00') 01:26:47 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, 0x0, 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:47 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60502035faf54031400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:47 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, 0x0, 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:47 executing program 3 (fault-call:9 fault-nth:5): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:47 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xffffffff) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_io_uring_setup(0x5cc4, &(0x7f0000000340)={0x0, 0xf852, 0x0, 0x1, 0x361}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff7000/0x7000)=nil, &(0x7f0000000180)=0x0, &(0x7f00000003c0)=0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r4, &(0x7f0000000500)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000400)="365d5824f782ff1b4eed35d2f8120396823369069942293a8d802b7c3f7363a6e96048e7ff34938f777e8f0e441152a038ef9872bfc5fc5c49e7b3006f69d2bdf09d01c16fde7359d4e7210b36cab5fdc86b84f037ae11be8c6ac2a29fe1f358d2eeeefcb1a67a45d33eabe66561f718ec687b795d106ed9d00af8366e92110d7c9676fa9abfa0775a31c940dba5f46329d1a75b78ddf355ae84c53aedc17a489ed25f1b52da9644addab1071813d76be86e0701b2551f3241c7040a2a84cac60947a2c2ce7ba2e1a311fd4d0f2942eefe", 0x0, 0x0, 0x1, {0x2, r5}}, 0x6) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x1, 0x4004, @fd, 0x5, &(0x7f0000000640)=""/232, 0xe8, 0x2, 0x0, {0x0, r5}}, 0xab98) syz_io_uring_submit(r3, 0x0, &(0x7f0000000080)=@IORING_OP_CLOSE={0x13, 0x2}, 0xfffe0000) 01:26:47 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:47 executing program 1 (fault-call:9 fault-nth:0): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 721.309686][ T6159] FAULT_INJECTION: forcing a failure. [ 721.309686][ T6159] name failslab, interval 1, probability 0, space 0, times 0 01:26:47 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r3, 0x4004f50d, &(0x7f0000000080)=0x1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:47 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54021400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:47 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 721.359231][ T6159] CPU: 1 PID: 6159 Comm: syz-executor.3 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 721.369849][ T6159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 721.381740][ T6159] Call Trace: [ 721.385042][ T6159] dump_stack+0x1d8/0x24e [ 721.389371][ T6179] FAULT_INJECTION: forcing a failure. [ 721.389371][ T6179] name failslab, interval 1, probability 0, space 0, times 0 [ 721.389501][ T6159] ? devkmsg_release+0x11c/0x11c [ 721.389519][ T6159] ? show_regs_print_info+0x12/0x12 [ 721.413341][ T6159] ? printk+0x11/0x114 [ 721.417608][ T6159] should_fail+0x6f6/0x860 [ 721.422661][ T6159] ? setup_fault_attr+0x3d0/0x3d0 [ 721.428125][ T6159] ? _raw_spin_unlock+0x49/0x60 [ 721.433865][ T6159] ? unshare_files+0x1c7/0x2d0 [ 721.438841][ T6159] ? __do_execve_file+0x29c/0x17e0 [ 721.444291][ T6159] should_failslab+0x5/0x20 [ 721.449084][ T6159] kmem_cache_alloc_trace+0x39/0x2b0 [ 721.454835][ T6159] __do_execve_file+0x29c/0x17e0 [ 721.460046][ T6159] ? __check_object_size+0x1f4/0x3a0 [ 721.465635][ T6159] ? __check_object_size+0x1bc/0x3a0 [ 721.471640][ T6159] ? asan.module_dtor+0x20/0x20 [ 721.476775][ T6159] ? do_execve_file+0x40/0x40 [ 721.481462][ T6159] ? getname_flags+0x1fe/0x640 [ 721.486464][ T6159] __x64_sys_execveat+0xcf/0xe0 [ 721.491307][ T6159] do_syscall_64+0xcb/0x1e0 [ 721.496002][ T6159] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 721.502048][ T6159] RIP: 0033:0x4665d9 01:26:47 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 721.506020][ T6159] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 721.525962][ T6159] RSP: 002b:00007f7841533188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 721.534374][ T6159] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 721.542791][ T6159] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 721.550861][ T6159] RBP: 00007f78415331d0 R08: 0000000000001100 R09: 0000000000000000 [ 721.558925][ T6159] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 721.566899][ T6159] R13: 00007ffe15520e8f R14: 00007f7841533300 R15: 0000000000022000 [ 721.579216][ T6179] CPU: 0 PID: 6179 Comm: syz-executor.1 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 721.589475][ T6179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 721.599731][ T6179] Call Trace: [ 721.603057][ T6179] dump_stack+0x1d8/0x24e [ 721.607471][ T6179] ? devkmsg_release+0x11c/0x11c [ 721.612491][ T6179] ? show_regs_print_info+0x12/0x12 [ 721.617709][ T6179] ? debug_smp_processor_id+0x20/0x20 [ 721.623182][ T6179] ? __fsnotify_parent+0x310/0x310 [ 721.628370][ T6179] should_fail+0x6f6/0x860 [ 721.632796][ T6179] ? setup_fault_attr+0x3d0/0x3d0 [ 721.637833][ T6179] ? vfs_write+0x422/0x4e0 [ 721.642317][ T6179] ? getname_flags+0xba/0x640 [ 721.647007][ T6179] should_failslab+0x5/0x20 [ 721.651507][ T6179] kmem_cache_alloc+0x36/0x290 [ 721.656305][ T6179] ? debug_smp_processor_id+0x20/0x20 [ 721.661681][ T6179] getname_flags+0xba/0x640 [ 721.666185][ T6179] __x64_sys_execveat+0xb6/0xe0 [ 721.671038][ T6179] do_syscall_64+0xcb/0x1e0 [ 721.675550][ T6179] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 721.681698][ T6179] RIP: 0033:0x4665d9 [ 721.685768][ T6179] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 01:26:47 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xe, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0xa3}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = syz_open_dev$mouse(&(0x7f0000000140), 0x80000000, 0x133280) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0x1b, 0x9, &(0x7f0000001300)=@raw=[@jmp={0x5, 0x1, 0x9, 0x6, 0x5, 0x100, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0x73}, @map={0x18, 0xd, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x5c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}, @exit], &(0x7f0000000180)='GPL\x00', 0x1, 0xf, &(0x7f00000001c0)=""/15, 0x41100, 0x4, '\x00', 0x0, 0x12, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000001240)={0x2, 0xc, 0x2, 0x4}, 0x10, 0xffffffffffffffff, r1}, 0x78) 01:26:47 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = clone3(&(0x7f0000000400)={0x10000, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000000240), {0x13}, &(0x7f0000000300)=""/66, 0x42, &(0x7f0000000380)=""/41, &(0x7f00000003c0)=[r0, r0, r0, r0], 0x4}, 0x58) sched_setparam(r1, &(0x7f0000000480)=0x9) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000001380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) openat$cgroup_subtree(r4, &(0x7f00000004c0), 0x2, 0x0) write(r4, &(0x7f0000000340), 0xfffffd82) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_user\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r5, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r5, 0x0) r6 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x6100) write$cgroup_type(r6, &(0x7f0000000200), 0x175d900f) 01:26:47 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54041400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:47 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000169e362b2d530fcf334b7b927e000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:47 executing program 3 (fault-call:9 fault-nth:6): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 721.705619][ T6179] RSP: 002b:00007fcddd3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 721.714022][ T6179] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 721.722079][ T6179] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 721.730044][ T6179] RBP: 00007fcddd3d81d0 R08: 0000000000001100 R09: 0000000000000000 [ 721.738013][ T6179] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 721.745976][ T6179] R13: 00007ffd4dc74dcf R14: 00007fcddd3d8300 R15: 0000000000022000 01:26:47 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54081400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 721.841450][ T6216] FAULT_INJECTION: forcing a failure. [ 721.841450][ T6216] name failslab, interval 1, probability 0, space 0, times 0 01:26:47 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54101400000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 721.937146][ T6216] CPU: 1 PID: 6216 Comm: syz-executor.3 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 721.947340][ T6216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 721.957383][ T6216] Call Trace: [ 721.960719][ T6216] dump_stack+0x1d8/0x24e [ 721.965708][ T6216] ? devkmsg_release+0x11c/0x11c [ 721.970743][ T6216] ? show_regs_print_info+0x12/0x12 [ 721.976050][ T6216] should_fail+0x6f6/0x860 [ 721.980463][ T6216] ? setup_fault_attr+0x3d0/0x3d0 [ 721.985480][ T6216] ? prepare_creds+0x20/0x370 [ 721.990245][ T6216] should_failslab+0x5/0x20 [ 721.994762][ T6216] kmem_cache_alloc+0x36/0x290 [ 721.999627][ T6216] prepare_creds+0x20/0x370 [ 722.004220][ T6216] prepare_exec_creds+0x13/0xc0 [ 722.009156][ T6216] __do_execve_file+0x325/0x17e0 [ 722.014090][ T6216] ? do_execve_file+0x40/0x40 [ 722.018766][ T6216] ? getname_flags+0x1fe/0x640 [ 722.024574][ T6216] __x64_sys_execveat+0xcf/0xe0 [ 722.029774][ T6216] do_syscall_64+0xcb/0x1e0 [ 722.034371][ T6216] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 722.040358][ T6216] RIP: 0033:0x4665d9 [ 722.044442][ T6216] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 722.064427][ T6216] RSP: 002b:00007f7841533188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 722.072839][ T6216] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 01:26:47 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f456246020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:47 executing program 1 (fault-call:9 fault-nth:1): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:47 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54030800000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:47 executing program 3 (fault-call:9 fault-nth:7): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 722.080819][ T6216] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 722.088872][ T6216] RBP: 00007f78415331d0 R08: 0000000000001100 R09: 0000000000000000 [ 722.096926][ T6216] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 722.105159][ T6216] R13: 00007ffe15520e8f R14: 00007f7841533300 R15: 0000000000022000 [ 722.240749][ T6237] FAULT_INJECTION: forcing a failure. [ 722.240749][ T6237] name failslab, interval 1, probability 0, space 0, times 0 [ 722.252699][ T6242] FAULT_INJECTION: forcing a failure. [ 722.252699][ T6242] name failslab, interval 1, probability 0, space 0, times 0 [ 722.258545][ T6237] CPU: 0 PID: 6237 Comm: syz-executor.1 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 722.278102][ T6237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 722.288487][ T6237] Call Trace: [ 722.291871][ T6237] dump_stack+0x1d8/0x24e [ 722.297334][ T6237] ? devkmsg_release+0x11c/0x11c [ 722.302282][ T6237] ? show_regs_print_info+0x12/0x12 [ 722.307487][ T6237] should_fail+0x6f6/0x860 [ 722.312303][ T6237] ? setup_fault_attr+0x3d0/0x3d0 [ 722.317344][ T6237] ? dup_fd+0x6b/0xb60 [ 722.321597][ T6237] should_failslab+0x5/0x20 [ 722.326280][ T6237] kmem_cache_alloc+0x36/0x290 [ 722.331099][ T6237] ? __kasan_kmalloc+0x1a3/0x1e0 [ 722.336521][ T6237] ? proc_fail_nth_read+0x1c0/0x1c0 [ 722.341710][ T6237] dup_fd+0x6b/0xb60 [ 722.345605][ T6237] unshare_files+0x11b/0x2d0 [ 722.350186][ T6237] ? __ia32_sys_unshare+0x40/0x40 [ 722.355195][ T6237] __do_execve_file+0x24d/0x17e0 [ 722.360130][ T6237] ? __virt_addr_valid+0x1fd/0x290 [ 722.365580][ T6237] ? do_execve_file+0x40/0x40 [ 722.370337][ T6237] ? getname_flags+0x1fe/0x640 [ 722.375103][ T6237] __x64_sys_execveat+0xcf/0xe0 [ 722.380106][ T6237] do_syscall_64+0xcb/0x1e0 [ 722.385470][ T6237] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 722.391704][ T6237] RIP: 0033:0x4665d9 [ 722.395674][ T6237] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 722.416400][ T6237] RSP: 002b:00007fcddd3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 722.424891][ T6237] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 722.434243][ T6237] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 722.442220][ T6237] RBP: 00007fcddd3d81d0 R08: 0000000000001100 R09: 0000000000000000 [ 722.450445][ T6237] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 722.458514][ T6237] R13: 00007ffd4dc74dcf R14: 00007fcddd3d8300 R15: 0000000000022000 [ 722.466954][ T6242] CPU: 1 PID: 6242 Comm: syz-executor.3 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 722.477279][ T6242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 722.487730][ T6242] Call Trace: [ 722.491023][ T6242] dump_stack+0x1d8/0x24e [ 722.495354][ T6242] ? devkmsg_release+0x11c/0x11c [ 722.500305][ T6242] ? show_regs_print_info+0x12/0x12 [ 722.505586][ T6242] should_fail+0x6f6/0x860 [ 722.511738][ T6242] ? setup_fault_attr+0x3d0/0x3d0 [ 722.517120][ T6242] ? kzalloc+0x1d/0x30 [ 722.521630][ T6242] should_failslab+0x5/0x20 [ 722.526140][ T6242] __kmalloc+0x5f/0x2f0 [ 722.530297][ T6242] ? apic_timer_interrupt+0xa/0x20 [ 722.535401][ T6242] kzalloc+0x1d/0x30 [ 722.539297][ T6242] security_prepare_creds+0x46/0x210 [ 722.544577][ T6242] prepare_creds+0x27b/0x370 [ 722.549252][ T6242] prepare_exec_creds+0x13/0xc0 [ 722.554100][ T6242] __do_execve_file+0x325/0x17e0 [ 722.559124][ T6242] ? do_execve_file+0x40/0x40 [ 722.563797][ T6242] ? getname_flags+0x1fe/0x640 [ 722.568580][ T6242] __x64_sys_execveat+0xcf/0xe0 [ 722.573534][ T6242] do_syscall_64+0xcb/0x1e0 [ 722.578133][ T6242] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 722.584024][ T6242] RIP: 0033:0x4665d9 [ 722.588059][ T6242] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 722.607828][ T6242] RSP: 002b:00007f7841533188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 722.616408][ T6242] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 722.624647][ T6242] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 722.632734][ T6242] RBP: 00007f78415331d0 R08: 0000000000001100 R09: 0000000000000000 [ 722.640877][ T6242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 722.648925][ T6242] R13: 00007ffe15520e8f R14: 00007f7841533300 R15: 0000000000022000 01:26:50 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:50 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e880039a59434c80a00100a20610c00000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:50 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031402000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:50 executing program 3 (fault-call:9 fault-nth:8): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:50 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000169e362b2d530fcf334b7b927e000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:50 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:50 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 724.586681][ T6255] FAULT_INJECTION: forcing a failure. [ 724.586681][ T6255] name failslab, interval 1, probability 0, space 0, times 0 [ 724.639966][ T6255] CPU: 0 PID: 6255 Comm: syz-executor.3 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 724.650235][ T6255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 724.660287][ T6255] Call Trace: [ 724.663840][ T6255] dump_stack+0x1d8/0x24e [ 724.668357][ T6255] ? devkmsg_release+0x11c/0x11c [ 724.673357][ T6255] ? show_regs_print_info+0x12/0x12 [ 724.678551][ T6255] should_fail+0x6f6/0x860 [ 724.683061][ T6255] ? setup_fault_attr+0x3d0/0x3d0 [ 724.688076][ T6255] ? stack_trace_save+0x120/0x1f0 [ 724.693096][ T6255] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 724.699078][ T6255] ? __alloc_file+0x26/0x380 [ 724.703663][ T6255] should_failslab+0x5/0x20 [ 724.708162][ T6255] kmem_cache_alloc+0x36/0x290 [ 724.712937][ T6255] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 724.718996][ T6255] __alloc_file+0x26/0x380 [ 724.723409][ T6255] ? alloc_empty_file+0x49/0x1b0 [ 724.728334][ T6255] alloc_empty_file+0xa9/0x1b0 [ 724.733089][ T6255] path_openat+0x125/0x3da0 [ 724.738021][ T6255] ? is_bpf_text_address+0x280/0x2a0 [ 724.743737][ T6255] ? stack_trace_save+0x1f0/0x1f0 [ 724.748843][ T6255] ? arch_stack_walk+0xf8/0x140 [ 724.753772][ T6255] ? stack_trace_save+0x120/0x1f0 [ 724.758790][ T6255] ? do_filp_open+0x450/0x450 [ 724.763456][ T6255] ? stack_trace_save+0x120/0x1f0 [ 724.768469][ T6255] ? stack_trace_snprint+0x150/0x150 [ 724.773747][ T6255] ? __kasan_kmalloc+0x1a3/0x1e0 [ 724.778680][ T6255] ? stack_trace_snprint+0x150/0x150 [ 724.783953][ T6255] ? __kasan_kmalloc+0x137/0x1e0 [ 724.788894][ T6255] ? __kmalloc+0x174/0x2f0 [ 724.793300][ T6255] ? security_prepare_creds+0x46/0x210 [ 724.798751][ T6255] do_filp_open+0x208/0x450 [ 724.803250][ T6255] ? vfs_tmpfile+0x210/0x210 [ 724.807870][ T6255] ? do_open_execat+0xab/0x860 [ 724.812623][ T6255] do_open_execat+0x175/0x860 [ 724.817293][ T6255] ? memcpy+0x38/0x50 [ 724.821278][ T6255] ? open_exec+0x50/0x50 [ 724.825596][ T6255] ? selinux_cred_prepare+0x72/0x80 [ 724.830792][ T6255] ? apic_timer_interrupt+0xa/0x20 [ 724.835902][ T6255] ? __do_execve_file+0x563/0x17e0 01:26:50 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x8, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000020000000000000000000061113400000000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 01:26:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f00000000c0)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4de}, {0x0, 0x0, 0x40000000}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x7ff}, {&(0x7f0000012100)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f47a83305023c84ac4bbd3a8498f8a655fd2f465", 0x1d, 0x11080}, {&(0x7f0000000780)="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", 0x27a, 0x11588}], 0x0, &(0x7f0000000080)) [ 724.841007][ T6255] ? __do_execve_file+0x637/0x17e0 [ 724.846118][ T6255] __do_execve_file+0x64a/0x17e0 [ 724.851088][ T6255] ? apic_timer_interrupt+0xa/0x20 [ 724.856199][ T6255] ? __irqentry_text_end+0x1fc3fa/0x1fc3fa [ 724.861998][ T6255] ? do_execve_file+0x40/0x40 [ 724.866759][ T6255] ? getname_flags+0x1fe/0x640 [ 724.871520][ T6255] __x64_sys_execveat+0xcf/0xe0 [ 724.876371][ T6255] do_syscall_64+0xcb/0x1e0 [ 724.881021][ T6255] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 724.886911][ T6255] RIP: 0033:0x4665d9 [ 724.890804][ T6255] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 724.910408][ T6255] RSP: 002b:00007f7841533188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 724.918817][ T6255] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 724.926779][ T6255] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 724.934747][ T6255] RBP: 00007f78415331d0 R08: 0000000000001100 R09: 0000000000000000 [ 724.942903][ T6255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 724.950955][ T6255] R13: 00007ffe15520e8f R14: 00007f7841533300 R15: 0000000000022000 01:26:51 executing program 1 (fault-call:9 fault-nth:2): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:51 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031403000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:51 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:51 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 725.206332][ T6295] FAULT_INJECTION: forcing a failure. [ 725.206332][ T6295] name failslab, interval 1, probability 0, space 0, times 0 [ 725.230700][ T6295] CPU: 0 PID: 6295 Comm: syz-executor.1 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 725.240991][ T6295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 725.251128][ T6295] Call Trace: [ 725.254431][ T6295] dump_stack+0x1d8/0x24e [ 725.258764][ T6295] ? devkmsg_release+0x11c/0x11c [ 725.263691][ T6295] ? show_regs_print_info+0x12/0x12 [ 725.268889][ T6295] should_fail+0x6f6/0x860 [ 725.273310][ T6295] ? setup_fault_attr+0x3d0/0x3d0 [ 725.278328][ T6295] ? alloc_fdtable+0x93/0x250 [ 725.283004][ T6295] should_failslab+0x5/0x20 [ 725.287494][ T6295] kmem_cache_alloc_trace+0x39/0x2b0 [ 725.292772][ T6295] ? _raw_spin_lock+0xa3/0x1b0 [ 725.297704][ T6295] ? _raw_spin_trylock_bh+0x1a0/0x1a0 [ 725.303070][ T6295] alloc_fdtable+0x93/0x250 [ 725.307566][ T6295] dup_fd+0x785/0xb60 [ 725.311543][ T6295] unshare_files+0x11b/0x2d0 [ 725.316125][ T6295] ? __ia32_sys_unshare+0x40/0x40 [ 725.321141][ T6295] __do_execve_file+0x24d/0x17e0 [ 725.326181][ T6295] ? __virt_addr_valid+0x1fd/0x290 [ 725.331302][ T6295] ? do_execve_file+0x40/0x40 [ 725.336149][ T6295] ? getname_flags+0x1fe/0x640 [ 725.340915][ T6295] __x64_sys_execveat+0xcf/0xe0 [ 725.345764][ T6295] do_syscall_64+0xcb/0x1e0 [ 725.350444][ T6295] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 725.356328][ T6295] RIP: 0033:0x4665d9 [ 725.360224][ T6295] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 725.379916][ T6295] RSP: 002b:00007fcddd3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 725.388319][ T6295] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 725.396283][ T6295] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 725.404329][ T6295] RBP: 00007fcddd3d81d0 R08: 0000000000001100 R09: 0000000000000000 [ 725.412401][ T6295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 725.420548][ T6295] R13: 00007ffd4dc74dcf R14: 00007fcddd3d8300 R15: 0000000000022000 01:26:53 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e880039a59434c80a00100a20610c00000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:53 executing program 3 (fault-call:9 fault-nth:9): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:53 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e08"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:53 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031404000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:53 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:53 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e08"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:53 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e08"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:53 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031405000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 727.594621][ T6308] FAULT_INJECTION: forcing a failure. [ 727.594621][ T6308] name failslab, interval 1, probability 0, space 0, times 0 [ 727.682382][ T6308] CPU: 0 PID: 6308 Comm: syz-executor.3 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 727.692598][ T6308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 727.703125][ T6308] Call Trace: [ 727.706525][ T6308] dump_stack+0x1d8/0x24e [ 727.710861][ T6308] ? devkmsg_release+0x11c/0x11c [ 727.715796][ T6308] ? show_regs_print_info+0x12/0x12 [ 727.721224][ T6308] should_fail+0x6f6/0x860 [ 727.725730][ T6308] ? setup_fault_attr+0x3d0/0x3d0 [ 727.730842][ T6308] ? security_file_alloc+0x32/0x1f0 [ 727.736352][ T6308] should_failslab+0x5/0x20 [ 727.741027][ T6308] kmem_cache_alloc+0x36/0x290 [ 727.746024][ T6308] security_file_alloc+0x32/0x1f0 [ 727.751394][ T6308] __alloc_file+0xba/0x380 [ 727.756076][ T6308] alloc_empty_file+0xa9/0x1b0 [ 727.760929][ T6308] path_openat+0x125/0x3da0 [ 727.765538][ T6308] ? is_bpf_text_address+0x280/0x2a0 [ 727.771133][ T6308] ? stack_trace_save+0x1f0/0x1f0 [ 727.776600][ T6308] ? arch_stack_walk+0xf8/0x140 [ 727.781900][ T6308] ? stack_trace_save+0x120/0x1f0 [ 727.787351][ T6308] ? do_filp_open+0x450/0x450 [ 727.792211][ T6308] ? stack_trace_save+0x120/0x1f0 [ 727.797259][ T6308] ? stack_trace_snprint+0x150/0x150 [ 727.802630][ T6308] ? __kasan_kmalloc+0x1a3/0x1e0 [ 727.807668][ T6308] ? stack_trace_snprint+0x150/0x150 [ 727.813227][ T6308] ? __kasan_kmalloc+0x137/0x1e0 [ 727.818370][ T6308] ? __kmalloc+0x174/0x2f0 [ 727.823042][ T6308] ? security_prepare_creds+0x46/0x210 [ 727.829041][ T6308] do_filp_open+0x208/0x450 [ 727.833624][ T6308] ? vfs_tmpfile+0x210/0x210 [ 727.838402][ T6308] ? do_open_execat+0xab/0x860 [ 727.843427][ T6308] do_open_execat+0x175/0x860 [ 727.848318][ T6308] ? memcpy+0x38/0x50 [ 727.852382][ T6308] ? open_exec+0x50/0x50 [ 727.856623][ T6308] ? selinux_cred_prepare+0x72/0x80 [ 727.862028][ T6308] ? __rcu_read_lock+0x50/0x50 [ 727.866797][ T6308] ? prepare_creds+0x28f/0x370 [ 727.871836][ T6308] ? key_put+0x64/0x70 [ 727.876009][ T6308] __do_execve_file+0x64a/0x17e0 [ 727.880960][ T6308] ? do_execve_file+0x40/0x40 [ 727.886184][ T6308] ? getname_flags+0x1fe/0x640 [ 727.891132][ T6308] __x64_sys_execveat+0xcf/0xe0 [ 727.896263][ T6308] do_syscall_64+0xcb/0x1e0 [ 727.900976][ T6308] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 727.906953][ T6308] RIP: 0033:0x4665d9 [ 727.911449][ T6308] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 727.931826][ T6308] RSP: 002b:00007f7841533188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 727.940572][ T6308] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 727.949413][ T6308] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 727.958249][ T6308] RBP: 00007f78415331d0 R08: 0000000000001100 R09: 0000000000000000 [ 727.966499][ T6308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 727.974632][ T6308] R13: 00007ffe15520e8f R14: 00007f7841533300 R15: 0000000000022000 01:26:54 executing program 1 (fault-call:9 fault-nth:3): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:54 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e880039a59434c80a00100a20610c00000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:54 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e08"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:54 executing program 2: perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x403, 0xb}, 0x0, 0x0, 0x2, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xe, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x8f, 0x0, 0x160, 0x160, 0x62020000, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback=0x7f000002, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0xb003, 0x130, 0x160, 0x8, {0x0, 0x6801}, [@common=@unspec=@string={{0xc0}, {0x0, 0x0, 'kmp\x00', "4bc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x5a}}]}, @common=@unspec=@CONNMARK={0x30}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000000)) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) r2 = getpgid(0xffffffffffffffff) r3 = syz_open_dev$mouse(&(0x7f0000000580), 0xcd77, 0x4040) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x2, 0x9, 0x5, 0xff, 0x0, 0x3ff, 0x4060, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x1, @perf_bp={&(0x7f00000000c0), 0xc}, 0x10, 0x6, 0x4, 0xa89afd5ae405f8f2, 0x38, 0x3, 0x40, 0x0, 0xf4b4, 0x0, 0x7ff}, r2, 0x9, r3, 0x2) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) ioctl$PPPIOCATTCHAN(0xffffffffffffffff, 0x40047438, &(0x7f00000005c0)=0x3) signalfd4(r4, &(0x7f0000000080)={[0x1000]}, 0x8, 0x80800) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00'}) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r5, 0xaf01, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 01:26:54 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031406000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:54 executing program 3 (fault-call:9 fault-nth:10): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:54 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:54 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e880039a59434c80a00100a20610c00000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:54 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031407000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 728.234171][ T6349] FAULT_INJECTION: forcing a failure. [ 728.234171][ T6349] name failslab, interval 1, probability 0, space 0, times 0 [ 728.249909][ T6348] FAULT_INJECTION: forcing a failure. [ 728.249909][ T6348] name failslab, interval 1, probability 0, space 0, times 0 [ 728.302476][ T6349] CPU: 1 PID: 6349 Comm: syz-executor.1 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 728.313179][ T6349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 728.315872][ T6347] xt_CT: You must specify a L4 protocol and not use inversions on it [ 728.323491][ T6349] Call Trace: [ 728.323515][ T6349] dump_stack+0x1d8/0x24e [ 728.323533][ T6349] ? devkmsg_release+0x11c/0x11c [ 728.344997][ T6349] ? show_regs_print_info+0x12/0x12 [ 728.350288][ T6349] should_fail+0x6f6/0x860 [ 728.354808][ T6349] ? setup_fault_attr+0x3d0/0x3d0 [ 728.359849][ T6349] ? kvmalloc_node+0x7e/0xf0 [ 728.365046][ T6349] should_failslab+0x5/0x20 [ 728.369635][ T6349] __kmalloc+0x5f/0x2f0 [ 728.374341][ T6349] ? alloc_fdtable+0x93/0x250 [ 728.379628][ T6349] kvmalloc_node+0x7e/0xf0 [ 728.384055][ T6349] alloc_fdtable+0xcf/0x250 [ 728.388665][ T6349] dup_fd+0x785/0xb60 [ 728.393010][ T6349] unshare_files+0x11b/0x2d0 [ 728.397808][ T6349] ? __ia32_sys_unshare+0x40/0x40 [ 728.403989][ T6349] __do_execve_file+0x24d/0x17e0 [ 728.409268][ T6349] ? __virt_addr_valid+0x1fd/0x290 [ 728.414496][ T6349] ? do_execve_file+0x40/0x40 [ 728.419173][ T6349] ? getname_flags+0x1fe/0x640 [ 728.423917][ T6349] __x64_sys_execveat+0xcf/0xe0 [ 728.428796][ T6349] do_syscall_64+0xcb/0x1e0 [ 728.433814][ T6349] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 728.439692][ T6349] RIP: 0033:0x4665d9 [ 728.443658][ T6349] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 728.464160][ T6349] RSP: 002b:00007fcddd3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 728.472653][ T6349] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 728.480606][ T6349] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 728.488556][ T6349] RBP: 00007fcddd3d81d0 R08: 0000000000001100 R09: 0000000000000000 01:26:54 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:54 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031408000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:54 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031409000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 728.496771][ T6349] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 728.504900][ T6349] R13: 00007ffd4dc74dcf R14: 00007fcddd3d8300 R15: 0000000000022000 [ 728.513473][ T6348] CPU: 0 PID: 6348 Comm: syz-executor.3 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 728.523802][ T6348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 728.533861][ T6348] Call Trace: [ 728.537334][ T6348] dump_stack+0x1d8/0x24e [ 728.541667][ T6348] ? devkmsg_release+0x11c/0x11c [ 728.546867][ T6348] ? show_regs_print_info+0x12/0x12 [ 728.552114][ T6348] should_fail+0x6f6/0x860 [ 728.556529][ T6348] ? setup_fault_attr+0x3d0/0x3d0 [ 728.561739][ T6348] ? security_file_alloc+0x32/0x1f0 [ 728.567285][ T6348] should_failslab+0x5/0x20 [ 728.571799][ T6348] kmem_cache_alloc+0x36/0x290 [ 728.576745][ T6348] security_file_alloc+0x32/0x1f0 [ 728.582034][ T6348] __alloc_file+0xba/0x380 [ 728.586455][ T6348] alloc_empty_file+0xa9/0x1b0 [ 728.591395][ T6348] path_openat+0x125/0x3da0 [ 728.596029][ T6348] ? is_bpf_text_address+0x280/0x2a0 [ 728.601321][ T6348] ? stack_trace_save+0x1f0/0x1f0 [ 728.606341][ T6348] ? arch_stack_walk+0xf8/0x140 [ 728.611360][ T6348] ? stack_trace_save+0x120/0x1f0 [ 728.616565][ T6348] ? do_filp_open+0x450/0x450 [ 728.621241][ T6348] ? stack_trace_save+0x120/0x1f0 [ 728.626264][ T6348] ? stack_trace_snprint+0x150/0x150 [ 728.631809][ T6348] ? __kasan_kmalloc+0x1a3/0x1e0 [ 728.636774][ T6348] ? stack_trace_snprint+0x150/0x150 [ 728.642060][ T6348] ? __kasan_kmalloc+0x137/0x1e0 [ 728.647013][ T6348] ? __kmalloc+0x174/0x2f0 [ 728.651426][ T6348] ? security_prepare_creds+0x46/0x210 [ 728.657148][ T6348] do_filp_open+0x208/0x450 [ 728.661663][ T6348] ? vfs_tmpfile+0x210/0x210 [ 728.666247][ T6348] ? do_open_execat+0xab/0x860 [ 728.671089][ T6348] do_open_execat+0x175/0x860 [ 728.675762][ T6348] ? memcpy+0x38/0x50 [ 728.679748][ T6348] ? open_exec+0x50/0x50 [ 728.683997][ T6348] ? selinux_cred_prepare+0x72/0x80 [ 728.689197][ T6348] ? __rcu_read_lock+0x50/0x50 [ 728.693959][ T6348] __do_execve_file+0x64a/0x17e0 [ 728.699066][ T6348] ? strncpy_from_user+0x147/0x350 [ 728.704165][ T6348] ? do_execve_file+0x40/0x40 [ 728.708850][ T6348] ? getname_flags+0x1fe/0x640 [ 728.713616][ T6348] __x64_sys_execveat+0xcf/0xe0 [ 728.718458][ T6348] do_syscall_64+0xcb/0x1e0 [ 728.723223][ T6348] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 728.729189][ T6348] RIP: 0033:0x4665d9 [ 728.733262][ T6348] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 728.753054][ T6348] RSP: 002b:00007f7841533188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 728.761652][ T6348] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 728.769861][ T6348] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 728.778114][ T6348] RBP: 00007f78415331d0 R08: 0000000000001100 R09: 0000000000000000 [ 728.786511][ T6348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 728.794828][ T6348] R13: 00007ffe15520e8f R14: 00007f7841533300 R15: 0000000000022000 01:26:57 executing program 1 (fault-call:9 fault-nth:4): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:57 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af5403140a000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:57 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() getrlimit(0xd, &(0x7f00000002c0)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x72, 0x0, 0x0, 0x0, 0x8}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000003c0)={&(0x7f00000005c0)={0x171c, 0xb, 0x1, 0x5, 0x70bd29, 0x25dfdbfd, {0xc, 0x0, 0x6}, [@typed={0x4, 0x85}, @nested={0x297, 0x19, 0x0, 0x1, [@typed={0x8, 0x55, 0x0, 0x0, @fd=r2}, @generic="f9fc967578d184effde8da77e432bc8ec92c76c8e06d3d693d1027b6098e40b097b04ee70ec57e60447bb6ab85cad70895cce96ac8fadf2bb40e95c966777c684d6e3995bf52a9829e618148d7e30a948b23f89fc1844548b5583f9d315303299fefb00227dc60950a0123344267d1924d7424787257c0968e281b972297e05afc29acdf8bff748974c1a57430fa7d4d387f885c1bd5695b1b03d25fcef3c6e4c6da1746cb464ce585c78aef2b462099de591914903390c422c1e5318bdc2209be4859cd97ef3215463a3702d26764da12fe23cc0669bf91b33e", @typed={0xc, 0x7b, 0x0, 0x0, @u64=0x10001}, @generic="b93492fb4572502a07ec3bea72b6fcf482aec3bcaf72e31e58700723d24a90f3", @typed={0x8b, 0x2, 0x0, 0x0, @binary="624edda23dea30e222e89b355d2cbdb2f59b52d066a578ef5300dfc1751bb3d443addc3326160d9316f0520aaf3361730043959384b461dc2a5ec3d8d7a311a03ae7115c8f8b649557355bb7938bafdcd448515152ab695076b46caacc8809b1ed326f5e9104600877bf79a86352351cac00af45d0c4076b52513332fd003aa8bf0d54081f9f08"}, @generic="b8d431bf7bb6c9aeb798ba6b4d58a15cf333c947f401902b4e798e89852f44330b03bfaa50d47698bf84e628e6c50de4f33fbf97bc3c9546714a7a398396e24da14a2d56e72af78aed8cd107307cb50ff0c8d4d528b4ff9e2ae367b8952aa06175c8949324733def0233ab0559015f79d53ff2c2b3e0a0043f307debcf5b67da06700b0a4b656bd1cbaddd047ec7a4fe91801f24ce65b529a0e88697b1559d9066624e6fcb8ab99274fba53fb7218ea33d202b6f075fa68e5bd8c0d43baa5b930e88145ef68e4c192dc2cefe3c24d0f5ecedfcff5be0935b0000c59b7b6f4be84e2da4ddf528690df6d4602a41a2437eea2b42ca15bc4c2c55"]}, @typed={0xc, 0x6e, 0x0, 0x0, @u64=0xe6ab}, @nested={0x145e, 0x11, 0x0, 0x1, [@generic="1b4f7f7ebd893dca6b2843f7fce0c703adfea19cf3a192e7c5e7f60d79198110d5c6510d597db3813c316d90c4be82fad6e0b2b7b6fc66312946f8eb50d252ac1f7747fc5bd54d9c6017e046bec3c1c1d2a9bbd3f23aea557855fe1a120cf2f45f27994eaceb852cf9b5b208681a427b0e9c61d19a97234ab57dbaf83a3dcec806c60417f1aea050c5c177d6e3d47d802ef9e8db5c8acb51d4046bc00d685530aa1723d67affab61f3", @generic="23b6ab56719712ffd0e3f65d66b79ce0bf2e3c165d035b68e283ea873fcc66015982ae00e0861196231f2bfb0ad7040b36fc23e6266bda7404b77e2dc1d54ec91d2956b39d65be969647bdbf1a9ee6b751bf8bc9a3786869231dd6d2dc516c93860257eb16c61c07886f77703ac9ba48580558867c5662f3d1104e92960ab7ba15e46cd24308c45147013dc1d645510d98e886b816c5dc6b8be8bce1e7f3f5b0830a3d9f04c1d43b30241d429df0422ebf4d4d47f016ddc6d7b1e43a29eeeebd9ef835d8b96c0b8d8d6c8242698ffc2352e268c612f0e9031bc7ee0b74ac07a8840c44ff44bcd5f4e0c584c905c55fa1b94b8c13abce5a5ea3f11d", @typed={0x4, 0x6}, @typed={0xc6, 0x31, 0x0, 0x0, @binary="d188678e9d32badd0202ede901a7b9edf4f606ecdd6b359892dcae2689827a6bd662be9daaf7c926de8d691841d7aa9cc835f55879011688d90f192aa5cfd21e112c32d07f8259c7df9d395f100ad2d23732ffee86031c87913567f0d69c1b4d2ff224554ed9b8b1bdf8a571bb3c915dacc604e66abef8ba368d6bd51f0b7f1801317b412c30478ef43a1c6c1572bcfacf10a891bab459ef834091c46eef896ae1e83f0f8651fa4692b3d0686999a92120fc67d61f080a9f0b79650a41edbf73d620"}, @generic="c5a8a0ff82f918516d98587ad6b864778bb831ca2d61e4e1e60b1e657b0d5fbc67a24c988e469546c32c067be6adcdd6cc583de49b99bc14f39ce2596e1cb01614aa0cb09326a2bf7dc9c3a55c653981e219f39c89516d7a64cadada6a5e992f816d3938f2db567ed7966f26f3dba2e14ab40768c4a2cb209cc459ab03cf73ae9ad8dffd20023689baf2eb600c95df5d23477fbc4a974a9f38398b829d87e4a2982859871cd1", @generic="3b29207935ff233d1e5b5d78cd23b292df261dfeb9833bcdf5d3bff75e5d3a42e74e0d676296aae8a6cb1f0c8bc8003cde295325294044671dcd51a88684e1b7fc2fb4d9da12", @generic="4c13635dc0664802c304c4e4b8a9688df20582303389bb63e00b471d1b63b876bc254bc7e955e870ffd52414ca6cb2c3fd769a2e79fe7cc970843480cbfeb1be673ae259e6a966dd034b1116eec4c2342fa10017c5d49f9e9b4fc7254ed0ea5caaf556d7f9b820535732da058425677d0a6889df112a56e29f6972458a2994a20eab7243ca742a23e35f9bdceffa4d7e814b20b347bbea62c5071222808893c672e25f1031806303843f953e2569eed320767f474ee309963c7d5410d8d418425cdeb0f44b3d349b85c69ca2cd5d2f53a7346c92f7c88264fd3749318902bd26bdb25c30bd6d4415b9864066511dae042e5c", @typed={0x1004, 0x4b, 0x0, 0x0, @binary="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"}, @typed={0x8, 0x78, 0x0, 0x0, @uid=0xee00}]}]}, 0x171c}}, 0x0) write(r2, &(0x7f0000000480), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500)}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000200)={0x38, 0x2}, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r3, 0x0) ioctl$int_out(r3, 0x2, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0xd0, &(0x7f00000000c0)=ANY=[]) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r4, r5, 0xffffffffffffffff) 01:26:57 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:57 executing program 5: setrlimit(0xd, 0x0) prlimit64(0xffffffffffffffff, 0x4, &(0x7f00000001c0)={0x8, 0x1255}, &(0x7f0000000040)) prlimit64(0xffffffffffffffff, 0x4, &(0x7f0000000080)={0x3, 0x9}, &(0x7f00000000c0)) getrlimit(0x0, &(0x7f0000000180)) syz_emit_ethernet(0x56, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffff8c7cec42630e86dd60a0f00000203aff7c01000000000000360000000000ff02000000000000000600005b93000000008c1e243fd8c21eeffe800000000000000f000000000000aa020100000000"], 0x0) 01:26:57 executing program 3 (fault-call:9 fault-nth:11): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:57 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a2000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:57 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af5403140b000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:26:57 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a2000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:26:57 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) r2 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000480)={'syztnl0\x00', 0x0}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x24, 0x37, 0x2, {0x2, 0x5, 0x9, r3, 0x6, '-^^:\'+'}}, 0x24) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r2, 0x2) dup3(r1, 0xffffffffffffffff, 0x80000) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) preadv(r4, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 01:26:57 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a2000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 731.299930][ T6394] FAULT_INJECTION: forcing a failure. [ 731.299930][ T6394] name failslab, interval 1, probability 0, space 0, times 0 [ 731.324367][ T6399] FAULT_INJECTION: forcing a failure. [ 731.324367][ T6399] name failslab, interval 1, probability 0, space 0, times 0 [ 731.340373][ T6394] CPU: 0 PID: 6394 Comm: syz-executor.3 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 731.350546][ T6394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 731.360602][ T6394] Call Trace: [ 731.363895][ T6394] dump_stack+0x1d8/0x24e [ 731.368282][ T6394] ? apic_timer_interrupt+0xa/0x20 [ 731.373391][ T6394] ? show_regs_print_info+0x12/0x12 [ 731.378608][ T6394] should_fail+0x6f6/0x860 [ 731.383028][ T6394] ? setup_fault_attr+0x3d0/0x3d0 [ 731.388067][ T6394] ? kasprintf+0xd1/0x120 [ 731.392444][ T6394] ? mm_alloc+0x1f/0xb0 [ 731.396859][ T6394] should_failslab+0x5/0x20 [ 731.401350][ T6394] kmem_cache_alloc+0x36/0x290 [ 731.406107][ T6394] mm_alloc+0x1f/0xb0 [ 731.410092][ T6394] __do_execve_file+0x91f/0x17e0 [ 731.415039][ T6394] ? do_execve_file+0x40/0x40 [ 731.419724][ T6394] ? getname_flags+0x1fe/0x640 [ 731.424483][ T6394] __x64_sys_execveat+0xcf/0xe0 [ 731.429499][ T6394] do_syscall_64+0xcb/0x1e0 [ 731.434100][ T6394] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 731.439992][ T6394] RIP: 0033:0x4665d9 [ 731.443882][ T6394] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 731.463580][ T6394] RSP: 002b:00007f7841533188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 731.471976][ T6394] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 731.480014][ T6394] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 731.487974][ T6394] RBP: 00007f78415331d0 R08: 0000000000001100 R09: 0000000000000000 [ 731.496365][ T6394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 731.504520][ T6394] R13: 00007ffe15520e8f R14: 00007f7841533300 R15: 0000000000022000 [ 731.512763][ T6399] CPU: 1 PID: 6399 Comm: syz-executor.1 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 731.522910][ T6399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 731.532961][ T6399] Call Trace: [ 731.536427][ T6399] dump_stack+0x1d8/0x24e [ 731.540754][ T6399] ? devkmsg_release+0x11c/0x11c [ 731.545691][ T6399] ? show_regs_print_info+0x12/0x12 [ 731.550890][ T6399] should_fail+0x6f6/0x860 [ 731.555298][ T6399] ? setup_fault_attr+0x3d0/0x3d0 [ 731.560399][ T6399] ? kvmalloc_node+0x7e/0xf0 [ 731.564990][ T6399] should_failslab+0x5/0x20 [ 731.569508][ T6399] __kmalloc+0x5f/0x2f0 [ 731.573742][ T6399] ? kvmalloc_node+0x7e/0xf0 [ 731.578419][ T6399] kvmalloc_node+0x7e/0xf0 [ 731.582839][ T6399] alloc_fdtable+0x146/0x250 [ 731.587423][ T6399] dup_fd+0x785/0xb60 [ 731.591404][ T6399] unshare_files+0x11b/0x2d0 [ 731.595997][ T6399] ? __ia32_sys_unshare+0x40/0x40 [ 731.601190][ T6399] __do_execve_file+0x24d/0x17e0 [ 731.606122][ T6399] ? __virt_addr_valid+0x1fd/0x290 [ 731.612010][ T6399] ? do_execve_file+0x40/0x40 [ 731.616935][ T6399] ? getname_flags+0x1fe/0x640 [ 731.621867][ T6399] __x64_sys_execveat+0xcf/0xe0 [ 731.626706][ T6399] do_syscall_64+0xcb/0x1e0 [ 731.631203][ T6399] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 731.637094][ T6399] RIP: 0033:0x4665d9 [ 731.641104][ T6399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 731.660796][ T6399] RSP: 002b:00007fcddd3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 731.669314][ T6399] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 731.677384][ T6399] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 731.685433][ T6399] RBP: 00007fcddd3d81d0 R08: 0000000000001100 R09: 0000000000000000 [ 731.693491][ T6399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 01:26:57 executing program 3 (fault-call:9 fault-nth:12): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 731.701453][ T6399] R13: 00007ffd4dc74dcf R14: 00007fcddd3d8300 R15: 0000000000022000 [ 731.742492][ T6424] FAULT_INJECTION: forcing a failure. [ 731.742492][ T6424] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 731.765163][ T6424] CPU: 1 PID: 6424 Comm: syz-executor.3 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 731.775419][ T6424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 731.785557][ T6424] Call Trace: [ 731.788859][ T6424] dump_stack+0x1d8/0x24e [ 731.793308][ T6424] ? devkmsg_release+0x11c/0x11c [ 731.798240][ T6424] ? show_regs_print_info+0x12/0x12 [ 731.803454][ T6424] ? __kasan_kmalloc+0x1a3/0x1e0 [ 731.808415][ T6424] ? __kasan_kmalloc+0x137/0x1e0 [ 731.813912][ T6424] ? kmem_cache_alloc+0x115/0x290 [ 731.818954][ T6424] ? mm_alloc+0x1f/0xb0 [ 731.823466][ T6424] should_fail+0x6f6/0x860 [ 731.827976][ T6424] ? setup_fault_attr+0x3d0/0x3d0 [ 731.833359][ T6424] __alloc_pages_nodemask+0x1c4/0x880 [ 731.838739][ T6424] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 731.845582][ T6424] __get_free_pages+0xa/0x30 [ 731.850697][ T6424] pgd_alloc+0x1e/0x2b0 [ 731.854859][ T6424] mm_init+0x497/0x7a0 [ 731.858939][ T6424] __do_execve_file+0x91f/0x17e0 [ 731.863893][ T6424] ? do_execve_file+0x40/0x40 [ 731.868742][ T6424] ? getname_flags+0x1fe/0x640 [ 731.873780][ T6424] __x64_sys_execveat+0xcf/0xe0 [ 731.878885][ T6424] do_syscall_64+0xcb/0x1e0 [ 731.883727][ T6424] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 731.889705][ T6424] RIP: 0033:0x4665d9 [ 731.893779][ T6424] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 731.914252][ T6424] RSP: 002b:00007f7841533188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 731.923059][ T6424] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 731.931104][ T6424] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 731.939413][ T6424] RBP: 00007f78415331d0 R08: 0000000000001100 R09: 0000000000000000 [ 731.947559][ T6424] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 731.955522][ T6424] R13: 00007ffe15520e8f R14: 00007f7841533300 R15: 0000000000022000 01:27:00 executing program 1 (fault-call:9 fault-nth:5): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:00 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af5403140c000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:00 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000003c0)=@known='user.incfs.metadata\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='/dkv/nullb0\x00'], &(0x7f0000000200)='./file0\x00', 0x0, 0x8000, &(0x7f0000000280)='ramfs\x00') perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000000040)='/dev/nullb0\x00', &(0x7f00000001c0)='./file0\x00', 0xffffffffffffff9c) time(0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="55e1bf51de558826cfde889bd46987cfbc8514b4dacedba4250f980842ce1b5e7282574cf8e007000000000000001a21de24e104b74d8cf6ddde3df74a1b7a0d80dee0218b7c9e37cb7eacbff9e3620e7bd811ff9493a8adb6afb727fb13c6f5d56bbbcef1dbeeaf2667695351f977b77a07db0588dff4af5535e01cb4cb23c8bcee17e506d4b9fc88b3b9cd4660088f97d56a86efe4f0e3497edc44f7ddcdf06b8d46034e4197f9980e554479f60bd7a93054f8f63a71de60f7d5d0d46721a3b617d6584730c6be04f9692435085430067348ea1b486403e4119eb31d291246e9"]) setresuid(0xee00, 0x0, 0xee01) read$FUSE(0xffffffffffffffff, &(0x7f0000004780)={0x2020}, 0x2020) openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) pipe(&(0x7f0000003400)) 01:27:00 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000480)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./bus/file0\x00', &(0x7f0000002740), 0x2088000, &(0x7f0000002fc0)={[{@index_off}], [{@fsmagic={'fsmagic', 0x3d, 0x3}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+&!),*#@}+$-{\'-!'}}, {@dont_measure}, {@fowner_eq}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) chdir(&(0x7f00000001c0)='./bus\x00') recvmmsg(r0, &(0x7f0000002d40)=[{{&(0x7f0000000380)=@ipx, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000400)=""/106, 0x6a}, 0x51}, {{&(0x7f00000004c0)=@l2, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000740)=""/120, 0x78}, {&(0x7f00000007c0)=""/136, 0x88}, {&(0x7f0000000880)=""/238, 0xee}], 0x4, &(0x7f0000000680)=""/41, 0x29}, 0x4}, {{&(0x7f0000000980)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000a00)=""/98, 0x62}], 0x1}, 0x400}, {{&(0x7f0000000ac0)=@x25, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000b40)=""/48, 0x30}, {&(0x7f0000000b80)=""/187, 0xbb}], 0x2, &(0x7f0000000c80)=""/121, 0x79}}, {{&(0x7f0000000d00)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000d80)=""/70, 0x46}, {&(0x7f0000000e00)=""/189, 0xbd}], 0x2, &(0x7f0000000f00)=""/189, 0xbd}, 0x9}, {{0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000001fc0)=""/145, 0x91}, {&(0x7f0000002080)=""/118, 0x76}], 0x3, &(0x7f0000002140)=""/112, 0x70}, 0x9}, {{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f00000021c0)=""/189, 0xbd}, {&(0x7f0000002280)=""/85, 0x55}, {&(0x7f0000002300)=""/69, 0x45}, {&(0x7f0000002380)=""/235, 0xeb}, {&(0x7f0000002480)=""/59, 0x3b}, {&(0x7f00000024c0)=""/132, 0x84}, {&(0x7f0000002580)=""/157, 0x9d}, {&(0x7f0000002640)=""/226, 0xe2}, {&(0x7f0000002740)}], 0x9, &(0x7f0000002840)=""/222, 0xde}, 0x3}, {{&(0x7f0000002940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x80, &(0x7f0000002a00)=[{&(0x7f00000029c0)=""/7, 0x7}], 0x1, &(0x7f0000002a40)=""/133, 0x85}, 0x2}, {{&(0x7f0000002b00)=@ipx, 0x80, &(0x7f0000002c80)=[{&(0x7f0000002b80)=""/230, 0xe6}], 0x1, &(0x7f0000002cc0)=""/99, 0x63}, 0x9}], 0x9, 0x10020, &(0x7f0000002f80)={0x77359400}) truncate(&(0x7f0000000340)='./bus/file0\x00', 0x0) stat(&(0x7f0000000540)='./bus/file0\x00', &(0x7f00000006c0)) 01:27:00 executing program 3 (fault-call:9 fault-nth:13): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:00 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af5403140d000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 734.293426][ T6437] FAULT_INJECTION: forcing a failure. [ 734.293426][ T6437] name failslab, interval 1, probability 0, space 0, times 0 [ 734.308161][ T6438] FAULT_INJECTION: forcing a failure. [ 734.308161][ T6438] name failslab, interval 1, probability 0, space 0, times 0 [ 734.351351][ T6437] CPU: 1 PID: 6437 Comm: syz-executor.3 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 734.361912][ T6437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 734.373565][ T6437] Call Trace: [ 734.376973][ T6437] dump_stack+0x1d8/0x24e [ 734.381929][ T6437] ? devkmsg_release+0x11c/0x11c [ 734.386856][ T6437] ? show_regs_print_info+0x12/0x12 [ 734.392422][ T6437] ? __alloc_pages_nodemask+0x3a2/0x880 [ 734.399436][ T6437] ? apic_timer_interrupt+0xa/0x20 [ 734.405069][ T6437] should_fail+0x6f6/0x860 [ 734.409483][ T6437] ? setup_fault_attr+0x3d0/0x3d0 [ 734.414540][ T6437] ? check_memory_region+0x1d0/0x2e0 [ 734.420425][ T6437] ? vm_area_alloc+0x20/0xe0 [ 734.425109][ T6437] should_failslab+0x5/0x20 [ 734.429680][ T6437] kmem_cache_alloc+0x36/0x290 [ 734.434435][ T6437] vm_area_alloc+0x20/0xe0 [ 734.438865][ T6437] __do_execve_file+0xa25/0x17e0 [ 734.443892][ T6437] ? do_execve_file+0x40/0x40 [ 734.449620][ T6437] ? getname_flags+0x1fe/0x640 [ 734.454464][ T6437] __x64_sys_execveat+0xcf/0xe0 [ 734.459309][ T6437] do_syscall_64+0xcb/0x1e0 [ 734.463819][ T6437] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 734.469736][ T6437] RIP: 0033:0x4665d9 [ 734.473811][ T6437] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 01:27:00 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af5403140e000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:00 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a2000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:00 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031410000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 734.494823][ T6437] RSP: 002b:00007f7841533188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 734.503622][ T6437] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 734.511798][ T6437] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 734.520482][ T6437] RBP: 00007f78415331d0 R08: 0000000000001100 R09: 0000000000000000 [ 734.528808][ T6437] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 734.536865][ T6437] R13: 00007ffe15520e8f R14: 00007f7841533300 R15: 0000000000022000 [ 734.546204][ T6436] overlayfs: 'file0' not a directory [ 734.552229][ T6438] CPU: 1 PID: 6438 Comm: syz-executor.1 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 734.563278][ T6438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 734.568770][ T6445] EXT4-fs (loop5): Unrecognized mount option "ramfs" or missing value [ 734.573799][ T6438] Call Trace: [ 734.573821][ T6438] dump_stack+0x1d8/0x24e [ 734.573833][ T6438] ? devkmsg_release+0x11c/0x11c [ 734.573843][ T6438] ? show_regs_print_info+0x12/0x12 [ 734.573852][ T6438] ? _raw_spin_lock+0xa3/0x1b0 [ 734.573870][ T6438] should_fail+0x6f6/0x860 [ 734.582038][ T6445] EXT4-fs (loop5): failed to parse options in superblock: ramfs [ 734.585384][ T6438] ? setup_fault_attr+0x3d0/0x3d0 [ 734.585393][ T6438] ? _raw_spin_unlock+0x49/0x60 [ 734.585402][ T6438] ? unshare_files+0x1c7/0x2d0 [ 734.585411][ T6438] ? __do_execve_file+0x29c/0x17e0 [ 734.585421][ T6438] should_failslab+0x5/0x20 [ 734.585437][ T6438] kmem_cache_alloc_trace+0x39/0x2b0 [ 734.589965][ T6445] EXT4-fs (loop5): Unrecognized mount option "Uá¿QÞUˆ&ÏÞˆ›Ôi‡Ï¼…´ÚÎÛ¤%˜BÎ^r‚WLøà" or missing value [ 734.594962][ T6438] __do_execve_file+0x29c/0x17e0 [ 734.594974][ T6438] ? __virt_addr_valid+0x1fd/0x290 [ 734.594989][ T6438] ? do_execve_file+0x40/0x40 [ 734.673630][ T6438] ? getname_flags+0x1fe/0x640 [ 734.678392][ T6438] __x64_sys_execveat+0xcf/0xe0 [ 734.683238][ T6438] do_syscall_64+0xcb/0x1e0 [ 734.687750][ T6438] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 734.693636][ T6438] RIP: 0033:0x4665d9 [ 734.697655][ T6438] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 734.717860][ T6438] RSP: 002b:00007fcddd3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 734.726271][ T6438] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 734.734335][ T6438] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 734.742304][ T6438] RBP: 00007fcddd3d81d0 R08: 0000000000001100 R09: 0000000000000000 01:27:00 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a2000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:00 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a2000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:00 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a200000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 734.750290][ T6438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 734.758458][ T6438] R13: 00007ffd4dc74dcf R14: 00007fcddd3d8300 R15: 0000000000022000 [ 734.771029][ T6436] overlayfs: filesystem on './bus' not supported as upperdir 01:27:03 executing program 1 (fault-call:9 fault-nth:6): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:03 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a200000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:03 executing program 3 (fault-call:9 fault-nth:14): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:03 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031411000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:03 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000480)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./bus/file0\x00', &(0x7f0000002740), 0x2088000, &(0x7f0000002fc0)={[{@index_off}], [{@fsmagic={'fsmagic', 0x3d, 0x3}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+&!),*#@}+$-{\'-!'}}, {@dont_measure}, {@fowner_eq}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) chdir(&(0x7f00000001c0)='./bus\x00') recvmmsg(r0, &(0x7f0000002d40)=[{{&(0x7f0000000380)=@ipx, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000400)=""/106, 0x6a}, 0x51}, {{&(0x7f00000004c0)=@l2, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000740)=""/120, 0x78}, {&(0x7f00000007c0)=""/136, 0x88}, {&(0x7f0000000880)=""/238, 0xee}], 0x4, &(0x7f0000000680)=""/41, 0x29}, 0x4}, {{&(0x7f0000000980)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000a00)=""/98, 0x62}], 0x1}, 0x400}, {{&(0x7f0000000ac0)=@x25, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000b40)=""/48, 0x30}, {&(0x7f0000000b80)=""/187, 0xbb}], 0x2, &(0x7f0000000c80)=""/121, 0x79}}, {{&(0x7f0000000d00)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000d80)=""/70, 0x46}, {&(0x7f0000000e00)=""/189, 0xbd}], 0x2, &(0x7f0000000f00)=""/189, 0xbd}, 0x9}, {{0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000001fc0)=""/145, 0x91}, {&(0x7f0000002080)=""/118, 0x76}], 0x3, &(0x7f0000002140)=""/112, 0x70}, 0x9}, {{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f00000021c0)=""/189, 0xbd}, {&(0x7f0000002280)=""/85, 0x55}, {&(0x7f0000002300)=""/69, 0x45}, {&(0x7f0000002380)=""/235, 0xeb}, {&(0x7f0000002480)=""/59, 0x3b}, {&(0x7f00000024c0)=""/132, 0x84}, {&(0x7f0000002580)=""/157, 0x9d}, {&(0x7f0000002640)=""/226, 0xe2}, {&(0x7f0000002740)}], 0x9, &(0x7f0000002840)=""/222, 0xde}, 0x3}, {{&(0x7f0000002940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x80, &(0x7f0000002a00)=[{&(0x7f00000029c0)=""/7, 0x7}], 0x1, &(0x7f0000002a40)=""/133, 0x85}, 0x2}, {{&(0x7f0000002b00)=@ipx, 0x80, &(0x7f0000002c80)=[{&(0x7f0000002b80)=""/230, 0xe6}], 0x1, &(0x7f0000002cc0)=""/99, 0x63}, 0x9}], 0x9, 0x10020, &(0x7f0000002f80)={0x77359400}) truncate(&(0x7f0000000340)='./bus/file0\x00', 0x0) stat(&(0x7f0000000540)='./bus/file0\x00', &(0x7f00000006c0)) 01:27:03 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000480)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./bus/file0\x00', &(0x7f0000002740), 0x2088000, &(0x7f0000002fc0)={[{@index_off}], [{@fsmagic={'fsmagic', 0x3d, 0x3}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+&!),*#@}+$-{\'-!'}}, {@dont_measure}, {@fowner_eq}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) chdir(&(0x7f00000001c0)='./bus\x00') recvmmsg(r0, &(0x7f0000002d40)=[{{&(0x7f0000000380)=@ipx, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000400)=""/106, 0x6a}, 0x51}, {{&(0x7f00000004c0)=@l2, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000740)=""/120, 0x78}, {&(0x7f00000007c0)=""/136, 0x88}, {&(0x7f0000000880)=""/238, 0xee}], 0x4, &(0x7f0000000680)=""/41, 0x29}, 0x4}, {{&(0x7f0000000980)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000a00)=""/98, 0x62}], 0x1}, 0x400}, {{&(0x7f0000000ac0)=@x25, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000b40)=""/48, 0x30}, {&(0x7f0000000b80)=""/187, 0xbb}], 0x2, &(0x7f0000000c80)=""/121, 0x79}}, {{&(0x7f0000000d00)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000d80)=""/70, 0x46}, {&(0x7f0000000e00)=""/189, 0xbd}], 0x2, &(0x7f0000000f00)=""/189, 0xbd}, 0x9}, {{0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000001fc0)=""/145, 0x91}, {&(0x7f0000002080)=""/118, 0x76}], 0x3, &(0x7f0000002140)=""/112, 0x70}, 0x9}, {{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f00000021c0)=""/189, 0xbd}, {&(0x7f0000002280)=""/85, 0x55}, {&(0x7f0000002300)=""/69, 0x45}, {&(0x7f0000002380)=""/235, 0xeb}, {&(0x7f0000002480)=""/59, 0x3b}, {&(0x7f00000024c0)=""/132, 0x84}, {&(0x7f0000002580)=""/157, 0x9d}, {&(0x7f0000002640)=""/226, 0xe2}, {&(0x7f0000002740)}], 0x9, &(0x7f0000002840)=""/222, 0xde}, 0x3}, {{&(0x7f0000002940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x80, &(0x7f0000002a00)=[{&(0x7f00000029c0)=""/7, 0x7}], 0x1, &(0x7f0000002a40)=""/133, 0x85}, 0x2}, {{&(0x7f0000002b00)=@ipx, 0x80, &(0x7f0000002c80)=[{&(0x7f0000002b80)=""/230, 0xe6}], 0x1, &(0x7f0000002cc0)=""/99, 0x63}, 0x9}], 0x9, 0x10020, &(0x7f0000002f80)={0x77359400}) truncate(&(0x7f0000000340)='./bus/file0\x00', 0x0) stat(&(0x7f0000000540)='./bus/file0\x00', &(0x7f00000006c0)) 01:27:03 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a200000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 737.311839][ T6485] FAULT_INJECTION: forcing a failure. [ 737.311839][ T6485] name failslab, interval 1, probability 0, space 0, times 0 [ 737.336811][ T6486] FAULT_INJECTION: forcing a failure. [ 737.336811][ T6486] name failslab, interval 1, probability 0, space 0, times 0 [ 737.349601][ T6486] CPU: 1 PID: 6486 Comm: syz-executor.3 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 737.359841][ T6486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 737.369980][ T6486] Call Trace: [ 737.373270][ T6486] dump_stack+0x1d8/0x24e [ 737.377606][ T6486] ? devkmsg_release+0x11c/0x11c [ 737.382555][ T6486] ? show_regs_print_info+0x12/0x12 [ 737.387757][ T6486] should_fail+0x6f6/0x860 [ 737.392182][ T6486] ? setup_fault_attr+0x3d0/0x3d0 [ 737.397395][ T6486] ? unwind_next_frame+0x1f0a/0x27b0 [ 737.402750][ T6486] ? ebitmap_cmp+0x1b8/0x220 [ 737.407341][ T6486] ? mls_compute_context_len+0x7dd/0x810 [ 737.412965][ T6486] ? context_struct_to_string+0x43b/0x8b0 [ 737.418676][ T6486] should_failslab+0x5/0x20 [ 737.423258][ T6486] __kmalloc+0x5f/0x2f0 [ 737.427503][ T6486] context_struct_to_string+0x43b/0x8b0 [ 737.433041][ T6486] ? __rcu_read_lock+0x50/0x50 [ 737.437798][ T6486] ? security_bounded_transition+0x560/0x560 [ 737.443855][ T6486] ? symhash+0xe0/0xe0 [ 737.447918][ T6486] ? hashtab_search+0x1bf/0x200 [ 737.452760][ T6486] context_add_hash+0x13f/0x270 [ 737.457601][ T6486] ? security_sid_to_context_inval+0x40/0x40 [ 737.463642][ T6486] ? mls_context_isvalid+0x272/0x380 [ 737.468916][ T6486] ? policydb_context_isvalid+0x1b6/0x400 [ 737.474627][ T6486] security_compute_sid+0x1142/0x1d00 [ 737.479992][ T6486] ? apic_timer_interrupt+0xa/0x20 [ 737.485098][ T6486] ? security_transition_sid+0x90/0x90 [ 737.490557][ T6486] ? cred_has_capability+0x2ca/0x420 [ 737.495836][ T6486] ? selinux_perf_event_write+0x100/0x100 [ 737.501545][ T6486] ? stack_trace_save+0x120/0x1f0 [ 737.506673][ T6486] ? stack_trace_snprint+0x150/0x150 [ 737.511956][ T6486] ? __set_page_owner+0x80/0x200 [ 737.516881][ T6486] ? cap_capable+0x23f/0x280 [ 737.521457][ T6486] ? security_capable+0xb1/0xd0 [ 737.526304][ T6486] ? ns_capable+0x83/0xe0 [ 737.530710][ T6486] security_transition_sid+0x78/0x90 [ 737.535987][ T6486] selinux_bprm_set_creds+0x45c/0xeb0 [ 737.541352][ T6486] ? selinux_netlink_send+0x890/0x890 [ 737.546715][ T6486] ? check_preemption_disabled+0x9e/0x330 [ 737.552423][ T6486] ? debug_smp_processor_id+0x20/0x20 [ 737.557784][ T6486] security_bprm_set_creds+0x50/0xb0 [ 737.563059][ T6486] prepare_binprm+0x539/0x770 [ 737.567834][ T6486] ? up_write+0xa6/0x270 [ 737.572064][ T6486] ? install_exec_creds+0x130/0x130 [ 737.577346][ T6486] ? __do_execve_file+0xbf1/0x17e0 [ 737.582533][ T6486] ? count+0x19a/0x200 [ 737.586938][ T6486] __do_execve_file+0x1042/0x17e0 [ 737.591980][ T6486] ? do_execve_file+0x40/0x40 [ 737.596650][ T6486] __x64_sys_execveat+0xcf/0xe0 [ 737.601492][ T6486] do_syscall_64+0xcb/0x1e0 [ 737.605991][ T6486] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 737.611870][ T6486] RIP: 0033:0x4665d9 [ 737.615756][ T6486] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 737.635786][ T6486] RSP: 002b:00007f7841533188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 737.644190][ T6486] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 737.652268][ T6486] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 01:27:03 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031412000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:03 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a2000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:03 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000180)='./file0\x00', 0x100) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002a00)={0x11, 0x7, &(0x7f0000000280)=ANY=[@ANYBLOB="1836000002000000000000000000000018280000", @ANYRES32=r1, @ANYBLOB="000000ffffffa59a02000400000095000000003b2da4311d0be9a32d9730a5000000000000000000000000005f7f21e4af6b415f34eee05c4060586785aa22db4b622ba6fdc5737f1ce91fc9e92160fc4033fbd637d44ef3c59a57ddc0d81737ea37f91c5146e04b02c56d1936b3c7bf839a50"], &(0x7f0000002840)='GPL\x00', 0xfffffffc, 0xee, &(0x7f0000002880)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x5c) openat(r1, &(0x7f00000001c0)='./file0\x00', 0x2040, 0x1fe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='bcache_btree_insert_key\x00'}, 0x10) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup3(r0, r2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x4, 0x40, 0x6d, 0x6, 0x20, @private2={0xfc, 0x2, '\x00', 0x1}, @private0={0xfc, 0x0, '\x00', 0x80}, 0x700, 0x700, 0x18000000, 0x4}}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x2, r3}) [ 737.660314][ T6486] RBP: 00007f78415331d0 R08: 0000000000001100 R09: 0000000000000000 [ 737.668454][ T6486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 737.676592][ T6486] R13: 00007ffe15520e8f R14: 00007f7841533300 R15: 0000000000022000 [ 737.688767][ T6485] CPU: 1 PID: 6485 Comm: syz-executor.1 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 737.698936][ T6485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 737.708985][ T6485] Call Trace: [ 737.712443][ T6485] dump_stack+0x1d8/0x24e [ 737.716751][ T6485] ? devkmsg_release+0x11c/0x11c [ 737.721666][ T6485] ? show_regs_print_info+0x12/0x12 [ 737.726851][ T6485] should_fail+0x6f6/0x860 [ 737.731265][ T6485] ? setup_fault_attr+0x3d0/0x3d0 [ 737.736374][ T6485] ? prepare_creds+0x20/0x370 [ 737.741218][ T6485] should_failslab+0x5/0x20 [ 737.745719][ T6485] kmem_cache_alloc+0x36/0x290 [ 737.750470][ T6485] prepare_creds+0x20/0x370 [ 737.755145][ T6485] prepare_exec_creds+0x13/0xc0 [ 737.760061][ T6485] __do_execve_file+0x325/0x17e0 [ 737.764969][ T6485] ? do_execve_file+0x40/0x40 [ 737.769702][ T6485] ? getname_flags+0x1fe/0x640 [ 737.774616][ T6485] __x64_sys_execveat+0xcf/0xe0 [ 737.779786][ T6485] do_syscall_64+0xcb/0x1e0 [ 737.784267][ T6485] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 737.790220][ T6485] RIP: 0033:0x4665d9 01:27:03 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af5403141c000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 737.794088][ T6485] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 737.814276][ T6485] RSP: 002b:00007fcddd3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 737.822668][ T6485] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 737.831081][ T6485] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 737.839674][ T6485] RBP: 00007fcddd3d81d0 R08: 0000000000001100 R09: 0000000000000000 [ 737.847710][ T6485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 737.855685][ T6485] R13: 00007ffd4dc74dcf R14: 00007fcddd3d8300 R15: 0000000000022000 01:27:03 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, 0x0, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:06 executing program 1 (fault-call:9 fault-nth:7): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:06 executing program 3 (fault-call:9 fault-nth:15): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:06 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, 0x0, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:06 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031426000000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:06 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, 0x0, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:06 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, 0x0, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:06 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, 0x0, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:06 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031404020000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 740.346228][ T6527] FAULT_INJECTION: forcing a failure. [ 740.346228][ T6527] name failslab, interval 1, probability 0, space 0, times 0 [ 740.363977][ T6521] FAULT_INJECTION: forcing a failure. [ 740.363977][ T6521] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 740.404079][ T6527] CPU: 1 PID: 6527 Comm: syz-executor.1 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 740.414251][ T6527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 740.424335][ T6527] Call Trace: [ 740.427624][ T6527] dump_stack+0x1d8/0x24e [ 740.431950][ T6527] ? devkmsg_release+0x11c/0x11c [ 740.436887][ T6527] ? show_regs_print_info+0x12/0x12 [ 740.442167][ T6527] should_fail+0x6f6/0x860 [ 740.446575][ T6527] ? setup_fault_attr+0x3d0/0x3d0 [ 740.451590][ T6527] ? kzalloc+0x1d/0x30 [ 740.455735][ T6527] should_failslab+0x5/0x20 [ 740.460242][ T6527] __kmalloc+0x5f/0x2f0 [ 740.464472][ T6527] ? refcount_add_checked+0x50/0x50 [ 740.469662][ T6527] kzalloc+0x1d/0x30 [ 740.473547][ T6527] security_prepare_creds+0x46/0x210 [ 740.478822][ T6527] prepare_creds+0x27b/0x370 [ 740.483403][ T6527] prepare_exec_creds+0x13/0xc0 [ 740.488245][ T6527] __do_execve_file+0x325/0x17e0 [ 740.493268][ T6527] ? do_execve_file+0x40/0x40 [ 740.497932][ T6527] ? getname_flags+0x1fe/0x640 [ 740.502680][ T6527] __x64_sys_execveat+0xcf/0xe0 [ 740.507520][ T6527] do_syscall_64+0xcb/0x1e0 [ 740.512110][ T6527] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 740.517988][ T6527] RIP: 0033:0x4665d9 [ 740.521894][ T6527] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 740.541480][ T6527] RSP: 002b:00007fcddd3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 740.549990][ T6527] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 740.557947][ T6527] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 740.565903][ T6527] RBP: 00007fcddd3d81d0 R08: 0000000000001100 R09: 0000000000000000 [ 740.573949][ T6527] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 740.581906][ T6527] R13: 00007ffd4dc74dcf R14: 00007fcddd3d8300 R15: 0000000000022000 [ 740.593743][ T6521] CPU: 0 PID: 6521 Comm: syz-executor.3 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 740.603899][ T6521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 740.614118][ T6521] Call Trace: [ 740.617407][ T6521] dump_stack+0x1d8/0x24e [ 740.621710][ T6521] ? devkmsg_release+0x11c/0x11c [ 740.626735][ T6521] ? show_regs_print_info+0x12/0x12 [ 740.632096][ T6521] should_fail+0x6f6/0x860 [ 740.636506][ T6521] ? setup_fault_attr+0x3d0/0x3d0 [ 740.641678][ T6521] ? shmem_getpage_gfp+0x2245/0x2410 [ 740.647053][ T6521] __alloc_pages_nodemask+0x1c4/0x880 [ 740.652483][ T6521] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 740.657997][ T6521] ? check_preemption_disabled+0x154/0x330 [ 740.663770][ T6521] ? debug_smp_processor_id+0x20/0x20 [ 740.669108][ T6521] ? check_preemption_disabled+0x9e/0x330 [ 740.674798][ T6521] ? __rcu_read_lock+0x50/0x50 [ 740.679534][ T6521] get_zeroed_page+0x15/0x40 [ 740.684269][ T6521] __pud_alloc+0x33/0x180 [ 740.688584][ T6521] handle_mm_fault+0x309d/0x42f0 [ 740.693598][ T6521] ? finish_fault+0x230/0x230 [ 740.698252][ T6521] ? mark_page_accessed+0x4fb/0x5b0 [ 740.703432][ T6521] ? follow_page_mask+0x26c/0x1040 [ 740.708601][ T6521] ? follow_page_mask+0x286/0x1040 [ 740.713683][ T6521] ? vmacache_update+0x6c/0xf0 [ 740.718522][ T6521] ? find_extend_vma+0xc7/0x290 [ 740.723428][ T6521] __get_user_pages+0xc01/0x1340 [ 740.728425][ T6521] ? populate_vma_page_range+0xf0/0xf0 [ 740.733942][ T6521] ? apic_timer_interrupt+0xa/0x20 [ 740.739033][ T6521] get_user_pages_remote+0xec/0x640 [ 740.744465][ T6521] copy_strings+0x40f/0x8a0 [ 740.749224][ T6521] ? copy_strings_kernel+0xf0/0xf0 [ 740.754390][ T6521] ? count+0x19a/0x200 [ 740.758515][ T6521] __do_execve_file+0x10df/0x17e0 [ 740.763524][ T6521] ? do_execve_file+0x40/0x40 [ 740.768431][ T6521] ? getname_flags+0x1fe/0x640 [ 740.773165][ T6521] __x64_sys_execveat+0xcf/0xe0 [ 740.777986][ T6521] do_syscall_64+0xcb/0x1e0 [ 740.782457][ T6521] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 740.788368][ T6521] RIP: 0033:0x4665d9 [ 740.792321][ T6521] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 740.811979][ T6521] RSP: 002b:00007f7841533188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 740.820535][ T6521] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 740.828566][ T6521] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 740.836510][ T6521] RBP: 00007f78415331d0 R08: 0000000000001100 R09: 0000000000000000 [ 740.844450][ T6521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 740.852393][ T6521] R13: 00007ffe15520e8f R14: 00007f7841533300 R15: 0000000000022000 01:27:06 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, 0x0, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:06 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, 0x0, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:06 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x0, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:06 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031400030000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:09 executing program 1 (fault-call:9 fault-nth:8): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:09 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:09 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, 0x0, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:09 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x0, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:09 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031480030000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:09 executing program 5: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.pending_reads\x00', 0xc0, 0x0) syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000080)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x6000, @fd_index, 0x0, 0x0}, 0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) writev(r5, &(0x7f00000006c0)=[{&(0x7f0000000000)='0', 0x1}, {0x0}], 0x2) syz_io_uring_submit(0x0, r2, &(0x7f0000000000)=@IORING_OP_SPLICE={0x1e, 0x7, 0x0, @fd_index=0xa, 0x100, {0x0, r0}, 0x0, 0xc, 0x0, {0x0, r3, r5}}, 0xc232) 01:27:09 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x0, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:09 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, 0x0, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:09 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1102) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:09 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031402040000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:09 executing program 2: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty, 0xfffffffe}, 0x1c) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xb8, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x5, 0x800, 0x7}, 0x0, 0x3, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001640)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f0000000400)={{}, r4, 0x14, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r5]}, @devid}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000001cc0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r7, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r6, @ANYRES32=r5, @ANYRESOCT, @ANYRES32=r3, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, &(0x7f0000000300)={0x0, 0xfffffffffffffffd, @start={r6, 0x1, "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", "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"}, [0x7, 0x20, 0x0, 0x10001, 0x5, 0x0, 0x6, 0x9, 0x6, 0x4c7b, 0x0, 0x1ff, 0x7, 0x2, 0x0, 0x5, 0x1, 0x0, 0xfffffffffffffffc, 0x6, 0x1, 0x5, 0x2, 0x2, 0x0, 0x595, 0x4, 0x3c24, 0x415689b8, 0x100000000, 0x9, 0x0, 0xa88, 0x3, 0x60000000000, 0x401, 0x2, 0x6, 0x71d7, 0xfffffffffffffe00, 0x200, 0x8, 0x2, 0x3, 0x2, 0x240000000000000, 0xe65d, 0xffffffff, 0xff, 0x1, 0x3, 0x1, 0xab4, 0xffffffff7fffffff, 0x5, 0x9, 0x9, 0x5, 0x4, 0x6, 0x7fffffff, 0xf21, 0x8, 0xb9]}) r8 = open(&(0x7f0000000100)='./bus\x00', 0x11250c2, 0x0) r9 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r9, 0x208200) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000500000000000000000000850000002300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='ext4_es_lookup_extent_exit\x00', r10}, 0x10) sendfile(r0, r8, 0x0, 0x800000000007) 01:27:09 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1103) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 743.396765][ T6582] FAULT_INJECTION: forcing a failure. [ 743.396765][ T6582] name failslab, interval 1, probability 0, space 0, times 0 [ 743.483422][ T6582] CPU: 0 PID: 6582 Comm: syz-executor.1 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 743.493710][ T6582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 743.503842][ T6582] Call Trace: [ 743.507222][ T6582] dump_stack+0x1d8/0x24e [ 743.511562][ T6582] ? devkmsg_release+0x11c/0x11c [ 743.516494][ T6582] ? show_regs_print_info+0x12/0x12 [ 743.521776][ T6582] should_fail+0x6f6/0x860 [ 743.526194][ T6582] ? setup_fault_attr+0x3d0/0x3d0 [ 743.531209][ T6582] ? stack_trace_save+0x120/0x1f0 [ 743.536403][ T6582] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 743.542372][ T6582] ? __alloc_file+0x26/0x380 [ 743.546954][ T6582] should_failslab+0x5/0x20 [ 743.551448][ T6582] kmem_cache_alloc+0x36/0x290 [ 743.556208][ T6582] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 743.562357][ T6582] __alloc_file+0x26/0x380 [ 743.566992][ T6582] ? alloc_empty_file+0x49/0x1b0 [ 743.571932][ T6582] alloc_empty_file+0xa9/0x1b0 [ 743.576692][ T6582] path_openat+0x125/0x3da0 [ 743.581193][ T6582] ? is_bpf_text_address+0x280/0x2a0 [ 743.586592][ T6582] ? stack_trace_save+0x1f0/0x1f0 [ 743.591889][ T6582] ? arch_stack_walk+0xf8/0x140 [ 743.596875][ T6582] ? stack_trace_save+0x120/0x1f0 [ 743.601926][ T6582] ? do_filp_open+0x450/0x450 [ 743.606596][ T6582] ? stack_trace_save+0x120/0x1f0 [ 743.611610][ T6582] ? stack_trace_snprint+0x150/0x150 [ 743.617269][ T6582] ? __kasan_kmalloc+0x1a3/0x1e0 [ 743.622313][ T6582] ? stack_trace_snprint+0x150/0x150 [ 743.627606][ T6582] ? __kasan_kmalloc+0x137/0x1e0 [ 743.632623][ T6582] ? __kmalloc+0x174/0x2f0 [ 743.637031][ T6582] ? security_prepare_creds+0x46/0x210 [ 743.642482][ T6582] do_filp_open+0x208/0x450 [ 743.646979][ T6582] ? vfs_tmpfile+0x210/0x210 [ 743.651652][ T6582] ? do_open_execat+0xab/0x860 [ 743.656486][ T6582] do_open_execat+0x175/0x860 [ 743.661321][ T6582] ? memcpy+0x38/0x50 [ 743.665297][ T6582] ? open_exec+0x50/0x50 [ 743.669526][ T6582] ? selinux_cred_prepare+0x72/0x80 [ 743.674816][ T6582] ? __rcu_read_lock+0x50/0x50 [ 743.679572][ T6582] ? prepare_creds+0x28f/0x370 [ 743.684415][ T6582] ? key_put+0x64/0x70 [ 743.688494][ T6582] __do_execve_file+0x64a/0x17e0 [ 743.693618][ T6582] ? do_execve_file+0x40/0x40 [ 743.698903][ T6582] ? getname_flags+0x1fe/0x640 [ 743.703747][ T6582] __x64_sys_execveat+0xcf/0xe0 [ 743.708675][ T6582] do_syscall_64+0xcb/0x1e0 [ 743.713525][ T6582] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 743.719762][ T6582] RIP: 0033:0x4665d9 [ 743.723667][ T6582] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 743.744499][ T6582] RSP: 002b:00007fcddd3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 743.753610][ T6582] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 743.761854][ T6582] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 743.770823][ T6582] RBP: 00007fcddd3d81d0 R08: 0000000000001100 R09: 0000000000000000 [ 743.779503][ T6582] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 743.788064][ T6582] R13: 00007ffd4dc74dcf R14: 00007fcddd3d8300 R15: 0000000000022000 [ 743.810330][ T6606] device lo entered promiscuous mode [ 743.864149][ T6615] Y­4`Ò˜: renamed from lo 01:27:12 executing program 1 (fault-call:9 fault-nth:9): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:12 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x0, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:12 executing program 5: sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x810) mlockall(0x5) 01:27:12 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1104) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:12 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031406040000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:12 executing program 2: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty, 0xfffffffe}, 0x1c) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xb8, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x5, 0x800, 0x7}, 0x0, 0x3, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001640)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f0000000400)={{}, r4, 0x14, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r5]}, @devid}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000001cc0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r7, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r6, @ANYRES32=r5, @ANYRESOCT, @ANYRES32=r3, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, &(0x7f0000000300)={0x0, 0xfffffffffffffffd, @start={r6, 0x1, "f924be145db57554bc9321c2369f903305a1ee4dabd1fde4655a28a60be8a9740ca59715bc26f6b3163a85b6341bca0b74fe9c5c4f4722ab02090e4e1c87b8414c1155215b779d19eb4eaba4bebd2a7a55005a3ebf3c593414d69ec38ac5a04f3eab0dc1c4b40b7df3095a91f4b2cdf7a86426216cba24188afa728051883a4295ce4aebb9080375fcc80f882f04c93f7a67e44e02f2223120a4d1dcd223be25af3997db4415663cec8552e18ab9b8c429fd165e9ab2b25fb6f1acb87a25b19b9cc3e709c68b41a7f05759547fbef311b281eb9b49e59a9e3cc7950b0b60d36d98aa5b3b08cdc54ec00fde7ffd1fe06b45515caaa6c4024a565ff8e0fa32974b7447157613924077562791496ba5b11a447bba6a270cd277a0229e7bfb6c2d51f099d90c7238bfa873b3eeffcfb6787682f8b01fc62c76ada1469b4e67136939600ce6756c5a063742547f5fe2e1c200109e8a64cd81bcb0ce654c2654dd2ebd0b94078bb61db1767c5d68e89e11eb25084b8b775f8094962a7bb8e8b026eb544c6fca033b24309149d4b95485bbaf08bf0698243f24e723c3f2b343ffeca724e36d4bfc2d6ad9b38a9b1ff600d29ca101897b6d9fd70e101680181b87a9e61707a3124756f199f5452729bbb679f5299492026ba42d60c142a1f553eb4d1e335796103a751dafa2b17336110c2379252d0f645d4746e040ba087638427d2ecc16ebae64b3876d4be66d2b3ec462f8228a4b306c51ca9de4f03291c439d46a6a1829d611bc798c32be9658a5393d4f8cc8640f091bf9c3b8dc9f1b89b7c0ed3bac1339c2ba5fb107232df2117ce98432878c83135938f7b19f42632adfcaf8bb25ceb3e71943d57943ef2882c6e510345ffae2b35db40117d0a50473d04886f8caa061479d5634abd0af31ed037a326052e8cc1a4a5ecf339b5822d6db3dfcfb191427f39cdc3ed2726f9671002a66fc253dac0a38879eed8a295eaabca121db4c0e4b3f21aa54021a71110ccd55a08e7b2dc47f017b0a24efb7a87a44f0bb8af8df7dbb73a8a35d8a51292557b58c999a3ce5132d984ed046824f0935cb49285ec5eba872ae83ccc50dea00f1fa4257ca2d4a481766e6233d9326a56476fd94e57155f7f892718d3c498610832de51ceb03c520f65717c9f953a163050daae836239f18d6e14783c7bb1e19a8972b328d08bde087bca907661b0eec431335f97a9d0396a599af4ed8308bcfcf91e53d37df39daf4ecba769be26b24eff43700cd380654ec1c5d75cbbea5d42a49be08f07ac027741303d5f16cfd98006cb4936c395e3875509512871ab805b79e3e0d9aa479f574588c0d37be96eb4f2fe771902cc96227eafd1a4bf211fcbca7c62a27d886aac0b6417f7dd259c233b9a9ecfe463000a4320c54f8a90c2d35f3f87a909003bde05acb674f3d952911ffda6f06", "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"}, [0x7, 0x20, 0x0, 0x10001, 0x5, 0x0, 0x6, 0x9, 0x6, 0x4c7b, 0x0, 0x1ff, 0x7, 0x2, 0x0, 0x5, 0x1, 0x0, 0xfffffffffffffffc, 0x6, 0x1, 0x5, 0x2, 0x2, 0x0, 0x595, 0x4, 0x3c24, 0x415689b8, 0x100000000, 0x9, 0x0, 0xa88, 0x3, 0x60000000000, 0x401, 0x2, 0x6, 0x71d7, 0xfffffffffffffe00, 0x200, 0x8, 0x2, 0x3, 0x2, 0x240000000000000, 0xe65d, 0xffffffff, 0xff, 0x1, 0x3, 0x1, 0xab4, 0xffffffff7fffffff, 0x5, 0x9, 0x9, 0x5, 0x4, 0x6, 0x7fffffff, 0xf21, 0x8, 0xb9]}) r8 = open(&(0x7f0000000100)='./bus\x00', 0x11250c2, 0x0) r9 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r9, 0x208200) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000500000000000000000000850000002300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='ext4_es_lookup_extent_exit\x00', r10}, 0x10) sendfile(r0, r8, 0x0, 0x800000000007) 01:27:12 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/bus/input/devices\x00', 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0xffffffffffffff81}, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000002c0), 0x8) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) inotify_init() r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x4000000000003bb, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) connect$bt_l2cap(r3, &(0x7f0000000200)={0x1f, 0x7, @none, 0x6, 0x2}, 0xe) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) clone(0x20120580, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pselect6(0x2c, &(0x7f00000000c0), 0x0, &(0x7f0000000100)={0xffc}, 0x0, 0x0) 01:27:12 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x0, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:12 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1105) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:12 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031480040000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 746.412170][ T6631] FAULT_INJECTION: forcing a failure. [ 746.412170][ T6631] name failslab, interval 1, probability 0, space 0, times 0 [ 746.481986][ T6631] CPU: 0 PID: 6631 Comm: syz-executor.1 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 746.492352][ T6631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 746.503022][ T6631] Call Trace: [ 746.506367][ T6631] dump_stack+0x1d8/0x24e [ 746.510703][ T6631] ? devkmsg_release+0x11c/0x11c [ 746.515635][ T6631] ? show_regs_print_info+0x12/0x12 [ 746.521180][ T6631] should_fail+0x6f6/0x860 [ 746.525603][ T6631] ? setup_fault_attr+0x3d0/0x3d0 [ 746.530825][ T6631] ? security_file_alloc+0x32/0x1f0 [ 746.536130][ T6631] should_failslab+0x5/0x20 [ 746.540666][ T6631] kmem_cache_alloc+0x36/0x290 [ 746.545511][ T6631] security_file_alloc+0x32/0x1f0 [ 746.550535][ T6631] __alloc_file+0xba/0x380 [ 746.554957][ T6631] alloc_empty_file+0xa9/0x1b0 [ 746.559725][ T6631] path_openat+0x125/0x3da0 [ 746.564320][ T6631] ? is_bpf_text_address+0x280/0x2a0 [ 746.569683][ T6631] ? stack_trace_save+0x1f0/0x1f0 [ 746.574707][ T6631] ? arch_stack_walk+0xf8/0x140 [ 746.579591][ T6631] ? stack_trace_save+0x120/0x1f0 [ 746.584620][ T6631] ? do_filp_open+0x450/0x450 [ 746.589408][ T6631] ? stack_trace_save+0x120/0x1f0 [ 746.594779][ T6631] ? stack_trace_snprint+0x150/0x150 [ 746.600142][ T6631] ? __kasan_kmalloc+0x1a3/0x1e0 [ 746.605158][ T6631] ? stack_trace_snprint+0x150/0x150 [ 746.610438][ T6631] ? __kasan_kmalloc+0x137/0x1e0 [ 746.615364][ T6631] ? __kmalloc+0x174/0x2f0 [ 746.619866][ T6631] ? security_prepare_creds+0x46/0x210 [ 746.625667][ T6631] do_filp_open+0x208/0x450 [ 746.630161][ T6631] ? vfs_tmpfile+0x210/0x210 [ 746.634745][ T6631] ? do_open_execat+0xab/0x860 [ 746.639498][ T6631] do_open_execat+0x175/0x860 [ 746.644253][ T6631] ? memcpy+0x38/0x50 [ 746.648227][ T6631] ? open_exec+0x50/0x50 [ 746.652468][ T6631] ? selinux_cred_prepare+0x72/0x80 [ 746.657659][ T6631] ? __rcu_read_lock+0x50/0x50 [ 746.662592][ T6631] ? prepare_creds+0x28f/0x370 [ 746.667595][ T6631] ? key_put+0x64/0x70 [ 746.671947][ T6631] __do_execve_file+0x64a/0x17e0 [ 746.676907][ T6631] ? do_execve_file+0x40/0x40 01:27:12 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1106) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 746.681601][ T6631] ? getname_flags+0x1fe/0x640 [ 746.686532][ T6631] __x64_sys_execveat+0xcf/0xe0 [ 746.691373][ T6631] do_syscall_64+0xcb/0x1e0 [ 746.695873][ T6631] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 746.701849][ T6631] RIP: 0033:0x4665d9 [ 746.705829][ T6631] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 01:27:12 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1107) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 746.725687][ T6631] RSP: 002b:00007fcddd3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 746.734292][ T6631] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 746.742372][ T6631] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 746.750356][ T6631] RBP: 00007fcddd3d81d0 R08: 0000000000001100 R09: 0000000000000000 [ 746.758417][ T6631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 746.766470][ T6631] R13: 00007ffd4dc74dcf R14: 00007fcddd3d8300 R15: 0000000000022000 01:27:15 executing program 1 (fault-call:9 fault-nth:10): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:15 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x240802, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x8, 0x12, 0x0, 0xff, 0x0, 0x7, 0x10000, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x7, 0x8001}, 0x4, 0x6, 0x1, 0x7, 0x0, 0x80000001, 0x2, 0x0, 0x3, 0x0, 0x10000}, 0x0, 0xa, 0xffffffffffffffff, 0xe) sendmsg$nl_route(r1, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x20008091) renameat(0xffffffffffffffff, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000002c40)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth0_virt_wifi\x00'}, @IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x4}]}, @IFLA_TXQLEN={0x8}]}, 0x48}}, 0x0) getsockname$packet(r0, &(0x7f0000000180), &(0x7f00000001c0)=0x14) splice(r1, &(0x7f0000000240)=0xffffffff, r3, &(0x7f0000000280)=0x3, 0x3, 0x3) r4 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x2, 0x7, 0x0, 0x0, 0x0, 0x400, 0x60800, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x401, 0x1}, 0x208, 0x8, 0x51a494e8, 0x9, 0x200, 0x5, 0x0, 0x0, 0x9, 0x0, 0xa7}, r4, 0x5, r2, 0x2) 01:27:15 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031400050000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:15 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1108) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:15 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0xa0200, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = dup2(r0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x1, 0x7f, 0x1, 0xfc, 0x0, 0xb5df, 0x80000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x20, 0x3fffc}, 0x100, 0x2, 0x8, 0x7, 0x98b, 0xc09, 0xd6, 0x0, 0x4, 0x0, 0x7}, 0x0, 0xc, r2, 0x0) chdir(&(0x7f0000000380)='./bus\x00') ftruncate(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x26) open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r4, 0x0) close(r3) 01:27:15 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1109) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:15 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x0, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:15 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af5403142d050000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:15 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0xa0200, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = dup2(r0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x1, 0x7f, 0x1, 0xfc, 0x0, 0xb5df, 0x80000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x20, 0x3fffc}, 0x100, 0x2, 0x8, 0x7, 0x98b, 0xc09, 0xd6, 0x0, 0x4, 0x0, 0x7}, 0x0, 0xc, r2, 0x0) chdir(&(0x7f0000000380)='./bus\x00') ftruncate(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x26) open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r4, 0x0) close(r3) 01:27:15 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 749.454241][ T6688] A link change request failed with some changes committed already. Interface veth0_virt_wifi may have been left with an inconsistent configuration, please check. [ 749.477837][ T6697] FAULT_INJECTION: forcing a failure. [ 749.477837][ T6697] name failslab, interval 1, probability 0, space 0, times 0 [ 749.522128][ T6697] CPU: 1 PID: 6697 Comm: syz-executor.1 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 749.533305][ T6697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 749.543633][ T6697] Call Trace: [ 749.546983][ T6697] dump_stack+0x1d8/0x24e [ 749.551330][ T6697] ? devkmsg_release+0x11c/0x11c [ 749.557704][ T6697] ? show_regs_print_info+0x12/0x12 [ 749.562914][ T6697] ? __kmalloc+0x174/0x2f0 [ 749.567378][ T6697] ? security_prepare_creds+0x46/0x210 [ 749.573110][ T6697] ? check_preemption_disabled+0x9e/0x330 [ 749.578921][ T6697] should_fail+0x6f6/0x860 [ 749.583523][ T6697] ? setup_fault_attr+0x3d0/0x3d0 [ 749.589074][ T6697] ? kasprintf+0xd1/0x120 [ 749.593610][ T6697] should_failslab+0x5/0x20 [ 749.598554][ T6697] __kmalloc_track_caller+0x5d/0x2e0 [ 749.603951][ T6697] kvasprintf+0xd6/0x180 [ 749.608176][ T6697] ? asan.module_ctor+0x10/0x10 [ 749.613245][ T6697] ? check_preemption_disabled+0x9e/0x330 [ 749.619150][ T6697] kasprintf+0xd1/0x120 [ 749.623466][ T6697] ? _raw_spin_unlock_irqrestore+0x57/0x80 [ 749.629357][ T6697] ? __do_execve_file+0x720/0x17e0 [ 749.632358][ T6722] A link change request failed with some changes committed already. Interface veth0_virt_wifi may have been left with an inconsistent configuration, please check. [ 749.634461][ T6697] ? kvasprintf_const+0x170/0x170 [ 749.634472][ T6697] ? prepare_creds+0x28f/0x370 [ 749.634482][ T6697] ? key_put+0x64/0x70 [ 749.634491][ T6697] __do_execve_file+0x79b/0x17e0 01:27:15 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031400060000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:15 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031404060000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 749.634502][ T6697] ? do_execve_file+0x40/0x40 [ 749.634510][ T6697] ? getname_flags+0x1fe/0x640 [ 749.634524][ T6697] __x64_sys_execveat+0xcf/0xe0 [ 749.685874][ T6697] do_syscall_64+0xcb/0x1e0 [ 749.690586][ T6697] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 749.696651][ T6697] RIP: 0033:0x4665d9 [ 749.700645][ T6697] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 749.721852][ T6697] RSP: 002b:00007fcddd3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 749.730367][ T6697] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 749.738687][ T6697] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 749.747021][ T6697] RBP: 00007fcddd3d81d0 R08: 0000000000001100 R09: 0000000000000000 [ 749.754988][ T6697] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 749.763136][ T6697] R13: 00007ffd4dc74dcf R14: 00007fcddd3d8300 R15: 0000000000022000 01:27:18 executing program 1 (fault-call:9 fault-nth:11): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:18 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031400070000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:18 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0xa0200, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = dup2(r0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x1, 0x7f, 0x1, 0xfc, 0x0, 0xb5df, 0x80000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x20, 0x3fffc}, 0x100, 0x2, 0x8, 0x7, 0x98b, 0xc09, 0xd6, 0x0, 0x4, 0x0, 0x7}, 0x0, 0xc, r2, 0x0) chdir(&(0x7f0000000380)='./bus\x00') ftruncate(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x26) open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r4, 0x0) close(r3) 01:27:18 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:18 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1108) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:18 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110a) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:18 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:18 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110b) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSTAT(r1, &(0x7f0000000080)={0x59, 0x7d, 0x2, {0x0, 0x52, 0x0, 0xffffffff, {0x2, 0x2, 0x5}, 0xab00000, 0xfffffff8, 0x6, 0x80000001, 0x5, 'rfdno', 0x9, 'trans=fd,', 0x8, '[){{:)$\xc9', 0x9, 'trans=fd,'}}, 0x59) fcntl$setpipe(r1, 0x407, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) writev(r3, &(0x7f00000006c0)=[{&(0x7f0000000000)='0', 0x1}, {0x0}], 0x2) mount$9p_fd(0xfeffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100), 0x18040, &(0x7f00000001c0)=ANY=[]) 01:27:18 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031400090000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:18 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r5, 0x4, 0x6000) lseek(r5, 0x4200, 0x0) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) open(0x0, 0x0, 0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 01:27:18 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 752.520877][ T6748] FAULT_INJECTION: forcing a failure. [ 752.520877][ T6748] name failslab, interval 1, probability 0, space 0, times 0 [ 752.574101][ T6748] CPU: 0 PID: 6748 Comm: syz-executor.1 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 752.584638][ T6748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 752.595146][ T6748] Call Trace: [ 752.598532][ T6748] dump_stack+0x1d8/0x24e [ 752.603274][ T6748] ? devkmsg_release+0x11c/0x11c [ 752.608301][ T6748] ? show_regs_print_info+0x12/0x12 [ 752.613584][ T6748] ? kvasprintf+0x107/0x180 [ 752.618266][ T6748] ? asan.module_ctor+0x10/0x10 [ 752.623502][ T6748] should_fail+0x6f6/0x860 [ 752.628741][ T6748] ? setup_fault_attr+0x3d0/0x3d0 [ 752.634365][ T6748] ? kasprintf+0xd1/0x120 [ 752.639273][ T6748] ? _raw_spin_unlock_irqrestore+0x57/0x80 [ 752.645091][ T6748] ? mm_alloc+0x1f/0xb0 [ 752.649518][ T6748] should_failslab+0x5/0x20 [ 752.654102][ T6748] kmem_cache_alloc+0x36/0x290 [ 752.658986][ T6748] mm_alloc+0x1f/0xb0 [ 752.662969][ T6748] __do_execve_file+0x91f/0x17e0 [ 752.668196][ T6748] ? do_execve_file+0x40/0x40 [ 752.673395][ T6748] ? getname_flags+0x1fe/0x640 [ 752.678776][ T6748] __x64_sys_execveat+0xcf/0xe0 [ 752.684153][ T6748] do_syscall_64+0xcb/0x1e0 [ 752.688776][ T6748] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 752.694930][ T6748] RIP: 0033:0x4665d9 [ 752.699001][ T6748] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 752.720005][ T6748] RSP: 002b:00007fcddd3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 752.729947][ T6748] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 752.738245][ T6748] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 752.746696][ T6748] RBP: 00007fcddd3d81d0 R08: 0000000000001100 R09: 0000000000000000 [ 752.755067][ T6748] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 752.763490][ T6748] R13: 00007ffd4dc74dcf R14: 00007fcddd3d8300 R15: 0000000000022000 01:27:21 executing program 1 (fault-call:9 fault-nth:12): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:21 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf20000000000000176e07000000151b00003d0301000000000095000e00000000007126000000000002bf67000000000000070600000fff07f0768700000200b403ca5e501098e40000bf050007f4ff02000000070700004c0000001f75000000000000bf5400000000f80000070500000400f9ffad43010009d1806af10000000000000005000000000000009510000000"], &(0x7f0000000100)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) close(r0) close(r1) r2 = gettid() r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0x8) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000540)={'sit0\x00', &(0x7f00000004c0)={'syztnl2\x00', 0x0, 0x2f, 0xff, 0x80, 0x24ba, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, 0x0, 0x40, 0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x13, 0x8, &(0x7f0000000400)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@jmp={0x5, 0x1, 0x0, 0x0, 0x2, 0x100, 0x8}, @exit, @map_val={0x18, 0x5, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x510b}, @ldst={0x3, 0x1, 0x0, 0x4, 0x2, 0xfffffffffffffffc}]}, &(0x7f0000000440)='GPL\x00', 0x8, 0x3c, &(0x7f0000000480)=""/60, 0x41000, 0xb, '\x00', r5, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x5, 0xe, 0x8, 0x1}, 0x10, 0x0, r0}, 0x78) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x1, 0x0, 0x2, 0x80, 0x0, 0x0, 0x40140, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x487}, 0x840, 0x800, 0xfff, 0x4, 0x3ff, 0x1, 0x1000, 0x0, 0x2, 0x0, 0xcd4}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x80, 0x20, 0x30, 0x0, 0x0, 0x89, 0x20209, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x1010, 0x7, 0x7fff, 0x9, 0x1, 0x1, 0x0, 0x0, 0x1000}, r2, 0x6, r3, 0x0) perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x8c, 0x20, 0x1, 0x7, 0x0, 0x8, 0x88100, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x80, 0x3, @perf_config_ext={0x80000000000000, 0x1}, 0x90, 0x30000000, 0x0, 0x7, 0x1bf9, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x2}, r2, 0x7, 0xffffffffffffffff, 0xa) r6 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0)={r3}, 0x8) openat$cgroup_ro(r6, 0x0, 0x0, 0x0) 01:27:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x20}}, 0x0) 01:27:21 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110c) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:21 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af540314000a0000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:21 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110d) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:21 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:21 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x24, 0x2, 0x3, 0x801, 0x0, 0x0, {}, [@NFQA_CFG_MASK={0x8}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x30}]}, 0x24}}, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x8200, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0x5c, 0x0, 0xb, 0x101, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x5}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_REV={0x8}, @NFTA_COMPAT_NAME={0x6, 0x1, '[\x00'}, @NFTA_COMPAT_NAME={0x7, 0x1, '#,\x00'}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x5}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2a1fc3c458305480}, 0x24040802) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2c6) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x8c3713, 0x0) 01:27:21 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af540314000b0000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) getpgid(0x0) r1 = socket$unix(0x1, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)) write(r1, &(0x7f0000000040)="fd6dd4d8ac0f80de03d18ff3580a37aca72cdda2d261b0caf21797710ff99578f89ca78efff85bc4ae64cb", 0x2b) r2 = syz_io_uring_setup(0x3ede, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x5}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r2, 0x2ff, 0x0, 0x0, 0x0, 0x0) 01:27:21 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af540314000c0000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:21 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x0, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 755.561547][ T6808] FAULT_INJECTION: forcing a failure. [ 755.561547][ T6808] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 755.599580][ T6808] CPU: 1 PID: 6808 Comm: syz-executor.1 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 755.610119][ T6808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 755.620253][ T6808] Call Trace: [ 755.623664][ T6808] dump_stack+0x1d8/0x24e [ 755.627994][ T6808] ? devkmsg_release+0x11c/0x11c [ 755.633211][ T6808] ? show_regs_print_info+0x12/0x12 [ 755.638581][ T6808] ? __kasan_kmalloc+0x1a3/0x1e0 [ 755.643606][ T6808] ? __kasan_kmalloc+0x137/0x1e0 [ 755.649236][ T6808] ? kmem_cache_alloc+0x115/0x290 [ 755.654557][ T6808] ? mm_alloc+0x1f/0xb0 [ 755.659030][ T6808] should_fail+0x6f6/0x860 [ 755.663627][ T6808] ? setup_fault_attr+0x3d0/0x3d0 [ 755.668888][ T6808] __alloc_pages_nodemask+0x1c4/0x880 [ 755.674258][ T6808] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 755.680149][ T6808] __get_free_pages+0xa/0x30 [ 755.684732][ T6808] pgd_alloc+0x1e/0x2b0 [ 755.688882][ T6808] mm_init+0x497/0x7a0 [ 755.693214][ T6808] __do_execve_file+0x91f/0x17e0 [ 755.698146][ T6808] ? do_execve_file+0x40/0x40 [ 755.702814][ T6808] ? getname_flags+0x1fe/0x640 [ 755.707655][ T6808] __x64_sys_execveat+0xcf/0xe0 [ 755.712512][ T6808] do_syscall_64+0xcb/0x1e0 [ 755.717014][ T6808] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 755.723254][ T6808] RIP: 0033:0x4665d9 [ 755.727137][ T6808] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 755.747281][ T6808] RSP: 002b:00007fcddd3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 755.755694][ T6808] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 755.763657][ T6808] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 755.771709][ T6808] RBP: 00007fcddd3d81d0 R08: 0000000000001100 R09: 0000000000000000 [ 755.779671][ T6808] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 755.787638][ T6808] R13: 00007ffd4dc74dcf R14: 00007fcddd3d8300 R15: 0000000000022000 01:27:24 executing program 1 (fault-call:9 fault-nth:13): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:24 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x0, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:24 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af540314000d0000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:24 executing program 5: syz_mount_image$ext4(&(0x7f0000004b80)='ext4\x00', &(0x7f0000004bc0)='./file0\x00', 0x0, 0x0, &(0x7f0000005c00), 0x0, &(0x7f0000005e00)={[], [{@euid_lt}]}) creat(&(0x7f00000015c0)='./file0/file0\x00', 0xf) recvmmsg(0xffffffffffffffff, &(0x7f00000052c0)=[{{&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)=""/149, 0x95}], 0x1, &(0x7f0000000180)=""/141, 0x8d}, 0x4}, {{&(0x7f0000000240)=@rc={0x1f, @fixed}, 0x80, &(0x7f0000001400)=[{&(0x7f00000002c0)=""/3, 0x3}, {&(0x7f0000000300)=""/1, 0x1}, {&(0x7f0000000340)=""/186, 0xba}, {&(0x7f0000000400)=""/4096, 0x1000}], 0x4, &(0x7f0000001440)=""/208, 0xd0}, 0x1}, {{&(0x7f0000001540)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f00000015c0)}, 0x5}, {{&(0x7f0000001600)=@un=@abs, 0x80, &(0x7f0000001680), 0x0, &(0x7f00000016c0)=""/57, 0x39}, 0x800}, {{&(0x7f0000001700)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast2}}, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001780)=""/200, 0xc8}, {&(0x7f0000001880)=""/251, 0xfb}, {&(0x7f0000001980)=""/93, 0x5d}, {&(0x7f0000001a00)=""/185, 0xb9}, {&(0x7f0000001ac0)=""/13, 0xd}, {&(0x7f0000001b00)=""/144, 0x90}, {&(0x7f0000001bc0)=""/74, 0x4a}], 0x7, &(0x7f0000001cc0)=""/13, 0xd}, 0x1}, {{&(0x7f0000001d00)=@nl, 0x80, &(0x7f0000002040)=[{&(0x7f0000001d80)=""/164, 0xa4}, {&(0x7f0000001e40)=""/243, 0xf3}, {&(0x7f0000001f40)=""/97, 0x61}, {&(0x7f0000001fc0)=""/84, 0x54}], 0x4, &(0x7f0000002080)=""/255, 0xff}, 0x1}, {{&(0x7f0000002180)=@rc={0x1f, @none}, 0x80, &(0x7f0000003640)=[{&(0x7f0000002200)=""/30, 0x1e}, {&(0x7f0000002240)=""/113, 0x71}, {&(0x7f00000022c0)=""/138, 0x8a}, {&(0x7f0000002380)=""/133, 0x85}, {&(0x7f0000002440)=""/190, 0xbe}, {&(0x7f0000002500)=""/4096, 0x1000}, {&(0x7f0000003500)=""/82, 0x52}, {&(0x7f0000003580)=""/168, 0xa8}], 0x8, &(0x7f00000036c0)=""/174, 0xae}, 0x9}, {{&(0x7f0000003780)=@in, 0x80, &(0x7f0000004b00)=[{&(0x7f0000003800)=""/73, 0x49}, {&(0x7f0000003880)=""/156, 0x9c}, {&(0x7f0000003940)=""/154, 0x9a}, {&(0x7f0000003a00)=""/4096, 0x1000}, {&(0x7f0000004a00)=""/210, 0xd2}], 0x5, &(0x7f0000004c00)=""/132, 0x84}, 0x1}, {{&(0x7f0000004cc0)=@can, 0x80, &(0x7f00000051c0)=[{&(0x7f0000004d40)=""/134, 0x86}, {&(0x7f0000004e00)=""/224, 0xe0}, {&(0x7f0000004f00)=""/64, 0x40}, {&(0x7f0000004f40)=""/74, 0x4a}, {&(0x7f0000004fc0)=""/198, 0xc6}, {&(0x7f00000050c0)=""/181, 0xb5}, {&(0x7f0000005180)}], 0x7, &(0x7f0000005240)=""/93, 0x5d}}], 0x9, 0x10103, 0x0) 01:27:24 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110e) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) getpgid(0x0) r1 = socket$unix(0x1, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)) write(r1, &(0x7f0000000040)="fd6dd4d8ac0f80de03d18ff3580a37aca72cdda2d261b0caf21797710ff99578f89ca78efff85bc4ae64cb", 0x2b) r2 = syz_io_uring_setup(0x3ede, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x5}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r2, 0x2ff, 0x0, 0x0, 0x0, 0x0) 01:27:24 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af540314000e0000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:24 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x0, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:24 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1110) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:24 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x0, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 758.560781][ T6847] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 01:27:24 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x0, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:24 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031400110000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 758.620286][ T6865] FAULT_INJECTION: forcing a failure. [ 758.620286][ T6865] name failslab, interval 1, probability 0, space 0, times 0 [ 758.668076][ T6865] CPU: 1 PID: 6865 Comm: syz-executor.1 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 758.678338][ T6865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 758.688477][ T6865] Call Trace: [ 758.691858][ T6865] dump_stack+0x1d8/0x24e [ 758.696366][ T6865] ? devkmsg_release+0x11c/0x11c [ 758.701327][ T6865] ? show_regs_print_info+0x12/0x12 [ 758.706696][ T6865] ? __alloc_pages_nodemask+0x3a2/0x880 [ 758.712240][ T6865] should_fail+0x6f6/0x860 [ 758.716744][ T6865] ? setup_fault_attr+0x3d0/0x3d0 [ 758.721774][ T6865] ? vm_area_alloc+0x20/0xe0 [ 758.726360][ T6865] should_failslab+0x5/0x20 [ 758.730876][ T6865] kmem_cache_alloc+0x36/0x290 [ 758.735637][ T6865] vm_area_alloc+0x20/0xe0 [ 758.740050][ T6865] __do_execve_file+0xa25/0x17e0 [ 758.744984][ T6865] ? do_execve_file+0x40/0x40 [ 758.749655][ T6865] ? getname_flags+0x1fe/0x640 [ 758.754410][ T6865] __x64_sys_execveat+0xcf/0xe0 [ 758.759255][ T6865] do_syscall_64+0xcb/0x1e0 [ 758.763748][ T6865] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 758.769626][ T6865] RIP: 0033:0x4665d9 [ 758.773602][ T6865] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 758.794149][ T6865] RSP: 002b:00007fcddd3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 758.802899][ T6865] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 758.810865][ T6865] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 758.818834][ T6865] RBP: 00007fcddd3d81d0 R08: 0000000000001100 R09: 0000000000000000 [ 758.826831][ T6865] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 758.835246][ T6865] R13: 00007ffd4dc74dcf R14: 00007fcddd3d8300 R15: 0000000000022000 [ 758.860806][ T6847] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 01:27:27 executing program 1 (fault-call:9 fault-nth:14): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:27 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1111) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x0, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:27 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031400120000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:27 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x0, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:27 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110d) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:27 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af540314001c0000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x0, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, 0xc000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x6, 0x40, 0x1, 0x0, 0x0, 0x10001, 0x11c19, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40, 0x0, 0x0, 0x6, 0x2, 0x4, 0x3ff, 0x0, @perf_config_ext={0x3, 0xd46a}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r0, 0x10, 0x8003, 0x8020001) r1 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x108) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x6e) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000019200)={0x8, 0x2}) fdatasync(r2) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000002c0)={@private1, 0x65}) tkill(0x0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) fcntl$lock(r1, 0x26, &(0x7f0000000100)={0x0, 0x2, 0x5, 0x13}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000180)={0x0, r2, 0x3fdc}) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) accept$unix(r3, 0x0, &(0x7f00000000c0)) 01:27:27 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1112) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 761.700918][ T6927] FAULT_INJECTION: forcing a failure. [ 761.700918][ T6927] name failslab, interval 1, probability 0, space 0, times 0 [ 761.713580][ T6927] CPU: 0 PID: 6927 Comm: syz-executor.1 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 761.723735][ T6927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 761.733787][ T6927] Call Trace: [ 761.737082][ T6927] dump_stack+0x1d8/0x24e [ 761.741406][ T6927] ? devkmsg_release+0x11c/0x11c [ 761.746333][ T6927] ? show_regs_print_info+0x12/0x12 [ 761.751521][ T6927] should_fail+0x6f6/0x860 [ 761.756023][ T6927] ? setup_fault_attr+0x3d0/0x3d0 [ 761.761055][ T6927] ? unwind_next_frame+0x1f0a/0x27b0 [ 761.766360][ T6927] ? ebitmap_cmp+0x1b8/0x220 [ 761.770943][ T6927] ? mls_compute_context_len+0x7dd/0x810 [ 761.776567][ T6927] ? context_struct_to_string+0x43b/0x8b0 [ 761.782375][ T6927] should_failslab+0x5/0x20 [ 761.786872][ T6927] __kmalloc+0x5f/0x2f0 [ 761.791026][ T6927] context_struct_to_string+0x43b/0x8b0 [ 761.796656][ T6927] ? __rcu_read_lock+0x50/0x50 [ 761.801419][ T6927] ? security_bounded_transition+0x560/0x560 [ 761.807739][ T6927] ? symhash+0xe0/0xe0 [ 761.811904][ T6927] ? hashtab_search+0x1bf/0x200 [ 761.816878][ T6927] context_add_hash+0x13f/0x270 [ 761.822604][ T6927] ? security_sid_to_context_inval+0x40/0x40 [ 761.828678][ T6927] ? mls_context_isvalid+0x272/0x380 [ 761.834568][ T6927] ? policydb_context_isvalid+0x1b6/0x400 [ 761.840278][ T6927] security_compute_sid+0x1142/0x1d00 [ 761.845741][ T6927] ? security_transition_sid+0x90/0x90 [ 761.851200][ T6927] ? cred_has_capability+0x2ca/0x420 [ 761.856490][ T6927] ? selinux_perf_event_write+0x100/0x100 [ 761.862199][ T6927] ? stack_trace_save+0x120/0x1f0 [ 761.867298][ T6927] ? stack_trace_snprint+0x150/0x150 [ 761.872582][ T6927] ? cap_capable+0x23f/0x280 [ 761.877162][ T6927] ? security_capable+0xb1/0xd0 [ 761.882010][ T6927] ? ns_capable+0x83/0xe0 [ 761.886387][ T6927] security_transition_sid+0x78/0x90 [ 761.891669][ T6927] selinux_bprm_set_creds+0x45c/0xeb0 [ 761.897057][ T6927] ? selinux_netlink_send+0x890/0x890 [ 761.902519][ T6927] ? check_preemption_disabled+0x9e/0x330 [ 761.908669][ T6927] ? debug_smp_processor_id+0x20/0x20 [ 761.914124][ T6927] security_bprm_set_creds+0x50/0xb0 [ 761.919427][ T6927] prepare_binprm+0x539/0x770 [ 761.924113][ T6927] ? up_write+0xa6/0x270 [ 761.928453][ T6927] ? install_exec_creds+0x130/0x130 [ 761.933737][ T6927] ? count+0x19a/0x200 [ 761.937946][ T6927] __do_execve_file+0x1042/0x17e0 [ 761.943180][ T6927] ? do_execve_file+0x40/0x40 [ 761.947879][ T6927] ? getname_flags+0x1fe/0x640 [ 761.952647][ T6927] __x64_sys_execveat+0xcf/0xe0 [ 761.957571][ T6927] do_syscall_64+0xcb/0x1e0 [ 761.962157][ T6927] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 761.968065][ T6927] RIP: 0033:0x4665d9 [ 761.971964][ T6927] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 761.993385][ T6927] RSP: 002b:00007fcddd3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 01:27:27 executing program 2: syz_open_dev$evdev(0x0, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x400, "fe105400"}) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000400)=ANY=[@ANYBLOB="1201000000000040d80402f0000000000001090224000100000000090400000a0300000009210000040122290009058103"], 0x0) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io$hid(r1, &(0x7f0000000000)={0x24, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x22, 0x9, {0x9}}}, &(0x7f0000000080)={0x2c, 0x0, 0x0, 0x0, 0x0, 0x0}) 01:27:27 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af540314001f0000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 762.001809][ T6927] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 762.009993][ T6927] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 762.018145][ T6927] RBP: 00007fcddd3d81d0 R08: 0000000000001100 R09: 0000000000000000 [ 762.026390][ T6927] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 762.034453][ T6927] R13: 00007ffd4dc74dcf R14: 00007fcddd3d8300 R15: 0000000000022000 [ 762.331387][ T4271] usb 3-1: new high-speed USB device number 13 using dummy_hcd [ 762.701381][ T4271] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 762.712472][ T4271] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 762.723832][ T4271] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 10 [ 762.737887][ T4271] usb 3-1: New USB device found, idVendor=04d8, idProduct=f002, bcdDevice= 0.00 [ 762.748088][ T4271] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 762.761855][ T4271] usb 3-1: config 0 descriptor?? [ 763.501348][ T4271] usbhid 3-1:0.0: can't add hid device: -71 [ 763.507499][ T4271] usbhid: probe of 3-1:0.0 failed with error -71 [ 763.518445][ T4271] usb 3-1: USB disconnect, device number 13 [ 764.211187][ T4271] usb 3-1: new high-speed USB device number 14 using dummy_hcd 01:27:30 executing program 1 (fault-call:9 fault-nth:15): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:30 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x0, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:30 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1126) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:30 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031400200000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:30 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20888040}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="4bd9ffb19dce9dee5a207f2a74ef2e1f3c6b9258e0468c4072882c94dec034a75f5fb0c212aad7a674fd438ac5400237e90745224eb4c46cc09adb82b9cb04b1fda5b80d8e3b1800a747428afaae9b3a03c1f94452c11872382d083ef5d10f88da02b4f2e7145893c53a1f0aa7c864ec7c7b21f99a1aab81591f412bb4ddd58f745cfb2c8bea52f23fa817d5f6c67e9a44370914e9689cc9c113eef25dea9676f74b6e7b22a3a1107312dd611fec32f1ce3b0410f796bf6db4ae99fa3e0c65acbd4b11f143987744c64392ae52"], 0x2c}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20888040}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="4bd9ffb19dce9dee5a207f2a74ef2e1f3c6b9258e0468c4072882c94dec034a75f5fb0c212aad7a674fd438ac5400237e90745224eb4c46cc09adb82b9cb04b1fda5b80d8e3b1800a747428afaae9b3a03c1f94452c11872382d083ef5d10f88da02b4f2e7145893c53a1f0aa7c864ec7c7b21f99a1aab81591f412bb4ddd58f745cfb2c8bea52f23fa817d5f6c67e9a44370914e9689cc9c113eef25dea9676f74b6e7b22a3a1107312dd611fec32f1ce3b0410f796bf6db4ae99fa3e0c65acbd4b11f143987744c64392ae52"], 0x2c}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000080)={'wpan4\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20888040}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32=r5, @ANYBLOB="4bd9ffb19dce9dee5a207f2a74ef2e1f3c6b9258e0468c4072882c94dec034a75f5fb0c212aad7a674fd438ac5400237e90745224eb4c46cc09adb82b9cb04b1fda5b80d8e3b1800a747428afaae9b3a03c1f94452c11872382d083ef5d10f88da02b4f2e7145893c53a1f0aa7c864ec7c7b21f99a1aab81591f412bb4ddd58f745cfb2c8bea52f23fa817d5f6c67e9a44370914e9689cc9c113eef25dea9676f74b6e7b22a3a1107312dd611fec32f1ce3b0410f796bf6db4ae99fa3e0c65acbd4b11f143987744c64392ae52"], 0x2c}}, 0x0) sendmsg$NL802154_CMD_GET_SEC_KEY(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x70, 0x0, 0x2, 0x200, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}]}, 0x70}, 0x1, 0x0, 0x0, 0x40040}, 0x40800) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000e0209000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x200000}], 0x0, &(0x7f0000000540)={[{@usrjquota={'usrjquota', 0x3d, 'wpan3\x00'}}]}) 01:27:30 executing program 2: syz_open_dev$evdev(0x0, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x400, "fe105400"}) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000400)=ANY=[@ANYBLOB="1201000000000040d80402f0000000000001090224000100000000090400000a0300000009210000040122290009058103"], 0x0) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io$hid(r1, &(0x7f0000000000)={0x24, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x22, 0x9, {0x9}}}, &(0x7f0000000080)={0x2c, 0x0, 0x0, 0x0, 0x0, 0x0}) 01:27:30 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x0, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:30 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x112f) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:30 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031400260000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 764.645383][ T6971] FAULT_INJECTION: forcing a failure. [ 764.645383][ T6971] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 764.681573][ T6972] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 764.703639][ T6972] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 764.712879][ T6971] CPU: 1 PID: 6971 Comm: syz-executor.1 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 764.723044][ T6971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 764.733280][ T6971] Call Trace: [ 764.735570][ T6972] F2FS-fs (loop5): journaled quota format not specified [ 764.736685][ T6971] dump_stack+0x1d8/0x24e [ 764.736701][ T6971] ? devkmsg_release+0x11c/0x11c [ 764.753257][ T6971] ? show_regs_print_info+0x12/0x12 [ 764.758471][ T6971] should_fail+0x6f6/0x860 [ 764.762892][ T6971] ? setup_fault_attr+0x3d0/0x3d0 [ 764.768099][ T6971] ? shmem_getpage_gfp+0x2245/0x2410 [ 764.773917][ T6971] __alloc_pages_nodemask+0x1c4/0x880 [ 764.779484][ T6971] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 764.785034][ T6971] ? check_preemption_disabled+0x154/0x330 [ 764.791181][ T6971] ? debug_smp_processor_id+0x20/0x20 [ 764.796658][ T6971] ? current_time+0x1ae/0x2f0 [ 764.801328][ T6971] ? __rcu_read_lock+0x50/0x50 [ 764.806446][ T6971] get_zeroed_page+0x15/0x40 [ 764.811031][ T6971] __pud_alloc+0x33/0x180 [ 764.815786][ T6971] handle_mm_fault+0x309d/0x42f0 [ 764.820894][ T6971] ? finish_fault+0x230/0x230 [ 764.825651][ T6971] ? mark_page_accessed+0x4fb/0x5b0 [ 764.830848][ T6971] ? follow_page_mask+0x286/0x1040 [ 764.835963][ T6971] ? vmacache_update+0x6c/0xf0 [ 764.840806][ T6971] ? find_extend_vma+0xc7/0x290 [ 764.845845][ T6971] __get_user_pages+0xc01/0x1340 [ 764.850901][ T6971] ? populate_vma_page_range+0xf0/0xf0 [ 764.856531][ T6971] ? __fsnotify_parent+0x310/0x310 [ 764.861736][ T6971] get_user_pages_remote+0xec/0x640 [ 764.867291][ T6971] ? security_file_permission+0x1e9/0x300 [ 764.873266][ T6971] ? vfs_read+0x2ae/0x370 [ 764.877745][ T6971] copy_strings+0x40f/0x8a0 [ 764.882250][ T6971] ? copy_strings_kernel+0xf0/0xf0 [ 764.887453][ T6971] ? count+0x19a/0x200 [ 764.891602][ T6971] __do_execve_file+0x10df/0x17e0 [ 764.897503][ T6971] ? do_execve_file+0x40/0x40 [ 764.902178][ T6971] ? getname_flags+0x1fe/0x640 [ 764.906929][ T6971] __x64_sys_execveat+0xcf/0xe0 [ 764.911975][ T6971] do_syscall_64+0xcb/0x1e0 [ 764.916479][ T6971] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 764.922710][ T6971] RIP: 0033:0x4665d9 [ 764.926602][ T6971] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 764.946630][ T6971] RSP: 002b:00007fcddd3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 01:27:30 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x113c) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:30 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af540314052d0000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:30 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x0, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 764.955135][ T6971] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 764.963195][ T6971] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 764.971154][ T6971] RBP: 00007fcddd3d81d0 R08: 0000000000001100 R09: 0000000000000000 [ 764.979114][ T6971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 764.987070][ T6971] R13: 00007ffd4dc74dcf R14: 00007fcddd3d8300 R15: 0000000000022000 [ 765.451133][ T4271] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 765.462742][ T4271] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 765.473939][ T4271] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 10 [ 765.487639][ T4271] usb 3-1: New USB device found, idVendor=04d8, idProduct=f002, bcdDevice= 0.00 [ 765.497342][ T4271] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 765.506830][ T4271] usb 3-1: config 0 descriptor?? [ 766.251093][ T4271] usbhid 3-1:0.0: can't add hid device: -71 [ 766.257218][ T4271] usbhid: probe of 3-1:0.0 failed with error -71 [ 766.267591][ T4271] usb 3-1: USB disconnect, device number 14 01:27:33 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af540314003f0000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:33 executing program 1 (fault-call:9 fault-nth:16): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1148) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:33 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x0, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:33 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x0, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:33 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x0, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20004}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x44854}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newsa={0x140, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@mcast1}, {@in6=@mcast2, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @extra_flags={0x8}]}, 0x140}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x11, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x8c00, &(0x7f0000000240)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x4003, 0x0, {0x0, 0x0, 0x0, 0x0, 0x205}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:27:33 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x0, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x114c) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:33 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000080)={0x10}, 0x10) r0 = socket$inet6(0xa, 0x80000, 0x9) close(r0) r1 = socket$inet6(0xa, 0x1, 0x100105) r2 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = open(&(0x7f0000000100)='./bus\x00', 0x11250c2, 0x0) r4 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r4, 0x208200) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000), 0x4) sendfile(r0, r3, 0x0, 0x8000fffffffe) r6 = open(&(0x7f00000001c0)='./file0\x00', 0x242080, 0x103) r7 = openat$cgroup_procs(r6, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) writev(r7, &(0x7f00000006c0)=[{&(0x7f0000000000)='0', 0x1}, {0x0}], 0x2) sendfile(r2, r7, &(0x7f0000000140)=0xff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct={0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, {0x40000000000000, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @usage=0x6, 0x0, 0x0, [0xfffffffffffffffe]}, {}, {0x0, 0x40000000000}}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000040)={0x0, 0x3, 0x4}) 01:27:33 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031400400000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:33 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 767.710944][ T7038] FAULT_INJECTION: forcing a failure. [ 767.710944][ T7038] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 767.751214][ T7053] device Y­4`Ò˜ left promiscuous mode [ 767.797255][ T7038] CPU: 0 PID: 7038 Comm: syz-executor.1 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 767.807800][ T7038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 767.818496][ T7038] Call Trace: [ 767.821878][ T7038] dump_stack+0x1d8/0x24e [ 767.826221][ T7038] ? devkmsg_release+0x11c/0x11c [ 767.831285][ T7038] ? show_regs_print_info+0x12/0x12 [ 767.836571][ T7038] ? preempt_count_add+0x66/0x130 [ 767.841597][ T7038] ? prep_new_page+0x122/0x380 [ 767.846626][ T7038] should_fail+0x6f6/0x860 [ 767.851217][ T7038] ? setup_fault_attr+0x3d0/0x3d0 [ 767.856241][ T7038] __alloc_pages_nodemask+0x1c4/0x880 [ 767.861877][ T7038] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 767.867593][ T7038] ? _raw_spin_trylock_bh+0x1a0/0x1a0 [ 767.873084][ T7038] ? current_time+0x1ae/0x2f0 [ 767.878029][ T7038] ? __rcu_read_lock+0x50/0x50 [ 767.882872][ T7038] __pmd_alloc+0x3a/0x1f0 [ 767.887199][ T7038] handle_mm_fault+0x3760/0x42f0 [ 767.892249][ T7038] ? finish_fault+0x230/0x230 [ 767.897005][ T7038] ? mark_page_accessed+0x4fb/0x5b0 [ 767.902197][ T7038] ? follow_page_mask+0x286/0x1040 [ 767.907675][ T7038] ? vmacache_update+0x6c/0xf0 [ 767.912432][ T7038] ? find_extend_vma+0xc7/0x290 [ 767.917311][ T7038] __get_user_pages+0xc01/0x1340 [ 767.922256][ T7038] ? populate_vma_page_range+0xf0/0xf0 [ 767.927889][ T7038] ? __fsnotify_parent+0x310/0x310 [ 767.933346][ T7038] get_user_pages_remote+0xec/0x640 [ 767.938530][ T7038] ? security_file_permission+0x1e9/0x300 [ 767.944463][ T7038] ? vfs_read+0x2ae/0x370 [ 767.949057][ T7038] copy_strings+0x40f/0x8a0 [ 767.953660][ T7038] ? copy_strings_kernel+0xf0/0xf0 [ 767.958840][ T7038] ? count+0x19a/0x200 [ 767.962887][ T7038] __do_execve_file+0x10df/0x17e0 [ 767.967883][ T7038] ? do_execve_file+0x40/0x40 [ 767.972535][ T7038] ? getname_flags+0x1fe/0x640 [ 767.977565][ T7038] __x64_sys_execveat+0xcf/0xe0 [ 767.982388][ T7038] do_syscall_64+0xcb/0x1e0 [ 767.986874][ T7038] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 767.992753][ T7038] RIP: 0033:0x4665d9 [ 767.996629][ T7038] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 768.016814][ T7038] RSP: 002b:00007fcddd3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 768.025384][ T7038] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 768.033510][ T7038] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 768.041732][ T7038] RBP: 00007fcddd3d81d0 R08: 0000000000001100 R09: 0000000000000000 [ 768.051596][ T7038] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 768.059906][ T7038] R13: 00007ffd4dc74dcf R14: 00007fcddd3d8300 R15: 0000000000022000 [ 768.449198][ T7053] device bridge0 left promiscuous mode [ 769.558815][ T7053] device veth3 left promiscuous mode [ 769.579370][ T7053] device veth5 left promiscuous mode [ 769.600926][ T7053] device veth7 left promiscuous mode [ 769.855311][ T7053] device veth9 left promiscuous mode [ 769.896999][ T7071] bridge0: port 1(bridge_slave_0) entered blocking state [ 769.904180][ T7071] bridge0: port 1(bridge_slave_0) entered forwarding state [ 769.913702][ T7071] bridge0: port 2(bridge_slave_1) entered blocking state [ 769.920795][ T7071] bridge0: port 2(bridge_slave_1) entered forwarding state [ 769.957810][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 769.965808][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 769.975580][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 769.984990][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 769.994297][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 770.003964][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 770.013020][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 770.022078][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 770.031430][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 770.039633][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 770.049096][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 770.057875][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 770.066813][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 770.075802][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 770.085106][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 770.094129][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 770.103194][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 770.112234][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 770.120530][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 770.129854][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [ 770.138192][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [ 770.146884][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [ 770.156072][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth4: link becomes ready [ 770.164582][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth7: link becomes ready [ 770.173551][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth6: link becomes ready [ 770.182610][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth9: link becomes ready [ 770.191393][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth8: link becomes ready 01:27:36 executing program 1 (fault-call:9 fault-nth:17): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:36 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1168) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:36 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:36 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031403800000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:36 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x0, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 770.611637][ T7075] bridge0: port 2(bridge_slave_1) entered disabled state [ 770.619531][ T7075] bridge0: port 1(bridge_slave_0) entered disabled state 01:27:36 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002680)=[{{&(0x7f0000000700)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000800)=""/109, 0x6d}, 0x2}], 0x1, 0x22, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f00000007c0)="30eb2297b18c0a2ada6f46f8341ce63ccdab668e820dabde", 0x41395563) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3, 0x100000000, 0x0, 0x0, 0x0, 0xe7}, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) writev(r4, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9623b", 0x8b}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a", 0x8c}, {&(0x7f0000001340)="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", 0x1b8}], 0x3) [ 770.711008][ T7087] FAULT_INJECTION: forcing a failure. [ 770.711008][ T7087] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 770.763277][ T7087] CPU: 0 PID: 7087 Comm: syz-executor.1 Not tainted 5.4.125-syzkaller-00234-g47fe7966921f #0 [ 770.774349][ T7087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 770.784538][ T7087] Call Trace: [ 770.787945][ T7087] dump_stack+0x1d8/0x24e [ 770.792430][ T7087] ? devkmsg_release+0x11c/0x11c [ 770.797644][ T7087] ? show_regs_print_info+0x12/0x12 [ 770.803648][ T7087] ? __set_page_owner+0x1e5/0x200 [ 770.808758][ T7087] ? preempt_count_add+0x66/0x130 [ 770.814074][ T7087] should_fail+0x6f6/0x860 [ 770.818684][ T7087] ? setup_fault_attr+0x3d0/0x3d0 [ 770.823898][ T7087] __alloc_pages_nodemask+0x1c4/0x880 [ 770.829626][ T7087] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 770.835349][ T7087] ? _raw_spin_lock+0xa3/0x1b0 [ 770.840526][ T7087] ? _raw_spin_trylock_bh+0x1a0/0x1a0 [ 770.845993][ T7087] ? check_preemption_disabled+0x9e/0x330 [ 770.852062][ T7087] pte_alloc_one+0x1b/0xb0 [ 770.856745][ T7087] __pte_alloc+0x1d/0x1c0 [ 770.861519][ T7087] handle_mm_fault+0x39b9/0x42f0 [ 770.866543][ T7087] ? finish_fault+0x230/0x230 [ 770.871450][ T7087] ? mark_page_accessed+0x4fb/0x5b0 [ 770.876758][ T7087] ? follow_page_mask+0x286/0x1040 [ 770.882338][ T7087] ? vmacache_update+0x6c/0xf0 [ 770.887096][ T7087] ? find_extend_vma+0xc7/0x290 [ 770.891938][ T7087] __get_user_pages+0xc01/0x1340 [ 770.897160][ T7087] ? populate_vma_page_range+0xf0/0xf0 [ 770.902746][ T7087] ? __fsnotify_parent+0x310/0x310 [ 770.907972][ T7087] get_user_pages_remote+0xec/0x640 [ 770.913255][ T7087] ? security_file_permission+0x1e9/0x300 [ 770.918966][ T7087] ? vfs_read+0x2ae/0x370 [ 770.923402][ T7087] copy_strings+0x40f/0x8a0 [ 770.927906][ T7087] ? copy_strings_kernel+0xf0/0xf0 [ 770.933011][ T7087] ? count+0x19a/0x200 [ 770.937168][ T7087] __do_execve_file+0x10df/0x17e0 [ 770.942188][ T7087] ? do_execve_file+0x40/0x40 [ 770.946856][ T7087] ? getname_flags+0x1fe/0x640 [ 770.951616][ T7087] __x64_sys_execveat+0xcf/0xe0 [ 770.956479][ T7087] do_syscall_64+0xcb/0x1e0 [ 770.961078][ T7087] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 770.967085][ T7087] RIP: 0033:0x4665d9 [ 770.971422][ T7087] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 770.991410][ T7087] RSP: 002b:00007fcddd3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 771.000001][ T7087] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 771.007968][ T7087] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 771.016016][ T7087] RBP: 00007fcddd3d81d0 R08: 0000000000001100 R09: 0000000000000000 [ 771.024085][ T7087] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 771.032042][ T7087] R13: 00007ffd4dc74dcf R14: 00007fcddd3d8300 R15: 0000000000022000 01:27:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20004}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x44854}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newsa={0x140, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@mcast1}, {@in6=@mcast2, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @extra_flags={0x8}]}, 0x140}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x11, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x8c00, &(0x7f0000000240)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x4003, 0x0, {0x0, 0x0, 0x0, 0x0, 0x205}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:27:38 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:38 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031404800000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:38 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x116c) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:38 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x3c, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x5) tkill(r3, 0x34) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) sched_setattr(r3, &(0x7f0000000000)={0x38, 0x7, 0x60, 0x2, 0x0, 0x100000000, 0x0, 0x2, 0x7, 0xa8efa5eb}, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) 01:27:38 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 773.145713][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 773.156969][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 773.177961][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 773.197431][ T4271] bridge0: port 1(bridge_slave_0) entered blocking state [ 773.204629][ T4271] bridge0: port 1(bridge_slave_0) entered forwarding state [ 773.217048][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 773.245352][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 773.257045][ T4271] bridge0: port 2(bridge_slave_1) entered blocking state [ 773.264335][ T4271] bridge0: port 2(bridge_slave_1) entered forwarding state [ 773.273692][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 773.283627][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 773.292665][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 773.301864][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 773.310215][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 773.319793][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 773.329168][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 773.338195][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 773.347280][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 773.356567][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 773.365648][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 773.374859][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 773.383922][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 773.393480][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 773.402370][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 773.411193][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 773.419452][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 773.428847][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 773.438045][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 773.447265][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 773.456242][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 773.465313][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 773.474448][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 773.483735][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [ 773.492783][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [ 773.501414][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [ 773.509187][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth4: link becomes ready [ 773.517875][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth7: link becomes ready [ 773.526846][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth6: link becomes ready [ 773.535203][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth9: link becomes ready [ 773.543801][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth8: link becomes ready [ 773.554008][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 01:27:39 executing program 1 (fault-call:9 fault-nth:18): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:39 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1174) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:39 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af540314fdef0000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x48, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ip6erspan={{0xe}, {0x8, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}]}}}, @IFLA_ADDRESS={0xa, 0x1, @random="861e20eb96b4"}]}, 0x48}}, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=@deltfilter={0x98, 0x2d, 0x4, 0x70bd2a, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0x9}, {0x5, 0x4}, {0x2}}, [@filter_kind_options=@f_flower={{0xb}, {0x60, 0x2, [@TCA_FLOWER_KEY_ENC_IPV6_DST_MASK={0x14, 0x22, [0xff000000, 0xff000000, 0xffffffff, 0xffffff00]}, @TCA_FLOWER_KEY_CT_LABELS_MASK={0x14, 0x62, "90bfa151c24531b8eb13e61544c40f03"}, @TCA_FLOWER_KEY_TCP_FLAGS_MASK={0x6, 0x48, 0x200}, @TCA_FLOWER_KEY_ENC_UDP_DST_PORT_MASK={0x6}, @TCA_FLOWER_KEY_MPLS_TTL={0x5, 0x43, 0x8}, @TCA_FLOWER_KEY_ENC_IPV6_SRC_MASK={0x14, 0x20, [0xffffff00, 0x0, 0xffffff00]}, @TCA_FLOWER_KEY_ICMPV6_TYPE_MASK={0x5}]}}, @TCA_RATE={0x6, 0x5, {0x8, 0xff}}]}, 0x98}, 0x1, 0x0, 0x0, 0x2000c081}, 0x8000) sendfile(r1, r0, &(0x7f0000001380)=0xafc00, 0xfff) umount2(&(0x7f0000000040)='./file0\x00', 0x4) umount2(&(0x7f0000001340)='./file0/file0\x00', 0x4) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000002c0), 0x1, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE(r4, 0x5000940e, &(0x7f0000000340)={{r3}, "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"}) 01:27:39 executing program 2: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000240)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f00000001c0)={r2, 0x1, r0, 0x4, 0x80000}) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x200, 0x70bd25, 0x25dfdbfc, "", ["", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x240c0081}, 0x24048041) syz_emit_ethernet(0x42, &(0x7f00000002c0)={@local, @link_local, @void, {@ipv4={0x800, @dccp={{0x9, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x21, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x18}, {[@ssrr={0x89, 0xb, 0x75, [@multicast1, @multicast2]}, @timestamp={0x44, 0x4}]}}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "985747", 0x0, 'R:*'}}}}}}, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000340)={@multicast, @random="ef51948e4e6d", @val={@val={0x9100, 0x0, 0x1}, {0x8100, 0x2, 0x0, 0x1}}, {@mpls_uc={0x8847, {[{0x8, 0x0, 0x1}, {0x211f}], @ipv4=@dccp={{0x8, 0x4, 0x0, 0x9, 0x78, 0x67, 0x0, 0x81, 0x21, 0x0, @multicast1, @remote, {[@timestamp_addr={0x44, 0xc, 0x36, 0x1, 0x1, [{@loopback, 0x1}]}]}}, {{0x4e21, 0x4e22, 0x4, 0x1, 0x2, 0x0, 0x0, 0x5, 0x2, "715b15", 0x1, "37a0b4"}, "e8e460bab75759930583a3fc62cc0470501188b277454fab7d96ebc01fbf18c39c1ce6972e1ee4b5d90cb4baa86be9f785c03c10d7d35d97f5b4c46c839f65bc93761840f7132f23"}}}}}}, 0x0) 01:27:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:39 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'lo\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x19, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000000000000000000007c110000000000009500000000000000eeecf55d9ce2302a48410580a6326327bde06c657aee9635f0f506001341bae4b0"], &(0x7f00000000c0)='GPL\x00', 0x2, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, 0x0, 0x480c4) 01:27:39 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af540314effd0000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='devices.list\x00', 0x275a, 0x0) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[@ANYRES64=r4], 0x8f) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f00002c5000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r5 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r5, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) sendfile(r5, r1, &(0x7f0000000000), 0x7ff) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:27:39 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x117a) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, 0x0, 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:42 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:42 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031400000800000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:42 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:42 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x11ef) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:42 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000140)={'gretap0\x00'}) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000180)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000100000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000300)=ANY=[@ANYRESOCT=r0]) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080), &(0x7f0000000280)={0x0, 0xfb, 0x66, 0x2, 0x4, "42248f7af0f24413ca85ac0f87847c55", "460689e562d1b3c8a50cc84bba905839c7d1576a3df500de2c701590e6df132e5ced8d233ccec2cccb21172b578fc9280b48cdcac1b636d0352c9b218806a49a083f4327d433f8f464d6b87758c5cb4338"}, 0x66, 0x0) 01:27:42 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=@bridge_newvlan={0x54, 0x70, 0x2, 0x70bd2c, 0x25dfdbff, {0x7, 0x0, 0x0, r1}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x4, 0x1}}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_STATE={0x5, 0x3, 0x1}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_RANGE={0x6, 0x2, 0xd}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_RANGE={0x6, 0x2, 0x10}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x5c}}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4004000}, 0x1) r2 = accept4$packet(r0, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000300)=0x14, 0x80800) setsockopt$sock_int(r2, 0x1, 0x9, &(0x7f0000000340)=0x100, 0x4) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'sit0\x00', r1, 0x4, 0x91, 0x3, 0x4, 0x14, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x8, 0x10, 0x3, 0x100000}}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_EDIT(r5, 0x0, 0x483, &(0x7f0000000440)={0x5c, @broadcast, 0x4e22, 0x4, 'nq\x00', 0x1a, 0x3ff, 0x2d}, 0x2c) r6 = open(&(0x7f0000000540)='./file0\x00', 0x80902, 0x4) sendmsg$ETHTOOL_MSG_STRSET_GET(r6, &(0x7f0000000980)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x322012}, 0xc, &(0x7f0000000940)={&(0x7f00000005c0)={0x348, 0x0, 0x4, 0x70bd28, 0x25dfdbfc, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0xa4, 0x2, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}]}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x74, 0x2, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0xafd54141d153076c}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x48, 0x2, 0x0, 0x1, [{0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x20, 0x2, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}]}, @ETHTOOL_A_STRSET_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x164, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0xc}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0x348}, 0x1, 0x0, 0x0, 0x200008c0}, 0x4000000) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000a80), 0x10) sendto$inet(r6, &(0x7f0000000ac0)="a2ed972010d2ce0366da3a690016d4105de03ee703624cc38aabdb40505ce39c7d4891", 0x23, 0x40008c0, &(0x7f0000000b00)={0x2, 0x4e20, @loopback}, 0x10) getpeername$packet(r2, &(0x7f0000000c40)={0x11, 0x0, 0x0}, &(0x7f0000000c80)=0x14) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d40)={0x18, 0x4, &(0x7f0000000b40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@call={0x85, 0x0, 0x0, 0x37}]}, &(0x7f0000000b80)='GPL\x00', 0x6, 0x4d, &(0x7f0000000bc0)=""/77, 0x41100, 0x8, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000cc0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x1, 0x3, 0x1b, 0x7}, 0x10}, 0x78) r9 = openat(r6, &(0x7f0000000dc0)='./file0\x00', 0x141000, 0x8b) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r9, 0x89f7, &(0x7f0000000e80)={'ip6_vti0\x00', &(0x7f0000000e00)={'syztnl1\x00', r4, 0x2b, 0x6, 0x4, 0x4, 0x40, @private0, @local, 0x700, 0x80, 0x2}}) sendmmsg(r9, &(0x7f0000001080)=[{{&(0x7f0000000ec0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r9, 0x3, 0x4, 0x1, 0x2, {0xa, 0x4e22, 0x4, @loopback, 0xfffff000}}}, 0x80, &(0x7f0000001040)=[{&(0x7f0000000f40)="1f2e3fc97cd5527b7e99e149b24c3605488949774a50b9007a1e72c52cf2f351a4999a31b31205a55ca805b1fa7723e202c4fa08a5464bc3cd3e1c95ce96fb3ae9d5e8ccd4af1c1c450493b88308898347dfa59c91e38d992e4e87b25769ef613b5048584168ba7c804b17c003002a4e5f4c20b381fe93e354e9d37f171737e05917cd65f82a68698a240f7b341bdc0ab803d7f4b72bed9304590aa70973c5da583e1a79d0a3c87e427b7d3711ee9b5722a961e9fe8392a6bed53235e2b8ea5c74f33ca061a959cc1ea719e62c5790d6de15fc693fcee454d458f8a4aadba7", 0xdf}], 0x1}}], 0x1, 0x4000800) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f00000010c0)={0x0, 0xea60}, 0x10) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000001100)={0x80000000, {{0x2, 0x4e22, @local}}, {{0x2, 0x4e24, @remote}}}, 0x108) 01:27:42 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039b622b462fa4a9a4bb706cea59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) preadv(r2, &(0x7f0000001580)=[{&(0x7f0000000080)=""/49, 0x31}, {&(0x7f0000000180)=""/207, 0xc3}, {&(0x7f0000000340)=""/187, 0xbb}, {&(0x7f0000001600)=""/251, 0xfb}, {&(0x7f0000000580)=""/4096, 0xfffffdae}, {&(0x7f00000000c0)=""/18, 0x12}], 0x6, 0x0, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:42 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1102) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:42 executing program 2: write$binfmt_script(0xffffffffffffffff, 0x0, 0x74) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a010100000000000000000200fffe0900010073797a300000000048000000030a01020000000000000000020000000900010073797a30000000000900030073797a320000000008000a40000000021400048008000140000000000800024000000003"], 0x90}}, 0x0) 01:27:42 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031440000800000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:42 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, 0x0, 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:42 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1103) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() tkill(r1, 0x40) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5, 0x5, 0xfe, 0x0, 0x0, 0x81, 0x2001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) 01:27:42 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x200000a, 0x101813, r0, 0x2d007000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000080)={0x5, 0x3, 0x200000000000}) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x78b92a7680add8cc) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:42 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, 0x0, 0x0, 0x0, 0x1100) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:42 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031400002000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:42 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1104) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:42 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:42 executing program 2: r0 = open(0x0, 0xa042, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x41ba, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x5}, 0x112, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000500), 0xffffffffffffffff) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1040}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"/318]) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0), &(0x7f00000025c0)=ANY=[], 0xe16, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$FUSE_INIT(r0, &(0x7f0000000780)={0x50, 0xfffffffffffffffe, 0x0, {0x7, 0x21, 0xffffffff, 0x1000022, 0x1959, 0x9, 0x6, 0x80002}}, 0x50) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x98a, 0x4) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x40, &(0x7f00000000c0)=0x8, 0x4) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002880)=[{{&(0x7f0000000380)=@ipx, 0x80, &(0x7f0000000300)=[{&(0x7f0000000400)=""/247, 0xf7}, {&(0x7f00000005c0)=""/70, 0x46}], 0x2, &(0x7f0000000540)=""/63, 0x3f}, 0x5}, {{&(0x7f0000001900)=@l2={0x1f, 0x0, @none}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001980)=""/211, 0xd3}, {&(0x7f0000001a80)=""/229, 0xe5}, {&(0x7f0000000800)=""/160, 0xa0}, {&(0x7f0000001c40)=""/46, 0x2e}, {&(0x7f0000006380)=""/4096, 0x1000}, {&(0x7f0000001c80)=""/195, 0xc3}], 0x6, &(0x7f0000001e00)=""/130, 0x82}, 0x4}, {{&(0x7f0000001ec0)=@rc={0x1f, @none}, 0x80, &(0x7f0000000280)=[{&(0x7f00000008c0)=""/250, 0xfa}, {&(0x7f0000002100)=""/3, 0x3}, {&(0x7f00000009c0)=""/144, 0x90}, {&(0x7f0000000a80)=""/187, 0xbb}], 0x4, &(0x7f0000002180)=""/129, 0x81}, 0x6}, {{0x0, 0x0, &(0x7f0000002480), 0x0, &(0x7f0000000340)=""/29, 0x1d}, 0x1}], 0x4, 0x1, &(0x7f00000029c0)={0x0, 0x989680}) preadv(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0xfec2, 0x6) fchmod(r1, 0x38) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000003400)=ANY=[@ANYBLOB="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"], 0xc001, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 01:27:42 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:42 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af5403147ffff000000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:42 executing program 5: symlink(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) fstat(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x20, &(0x7f0000000200)={[{@metacopy_off}, {@xino_off}, {@workdir={'workdir', 0x3d, './file0'}}, {@xino_off}, {@xino_on}, {@workdir={'workdir', 0x3d, './file0'}}], [{@obj_user={'obj_user', 0x3d, '/dev/zero\x00'}}, {@measure}, {@appraise_type}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x34, 0xdff52c8a3afbd5be, 0x39, 0x38, 0x61, 0x2f, 0x37], 0x2d, [0x66, 0x38, 0x38, 0x52], 0x2d, [0x65, 0x38, 0x31, 0x65], 0x2d, [0x62, 0x64, 0x35, 0x31], 0x2d, [0x63, 0x60, 0x61, 0x30, 0x63, 0x30, 0x76, 0x36]}}}, {@euid_gt={'euid>', r0}}, {@obj_user={'obj_user', 0x3d, '\xc9['}}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) linkat(r1, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0xae, &(0x7f0000000440)={@multicast, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x78, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0xb, "a78ce540cd4f791153d5dea6b259fe8000000000000023493b87aa0568f00b1c71a8242373244ad2439adc07df0a69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81802"}, {0x0, 0x1, "ffffefffa0f8ca1cc8000800"}]}}}}}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) 01:27:42 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1105) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:42 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:42 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x24100, 0xd4) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c468416565290d1de3e3bcf8b42094ebb1dbf8e020000000410004000c4a40003003e7f00000087fa406c7c42f1f4637f0ab1a59434c80a"], 0x3c) tkill(r1, 0x3f) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:42 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031400000001000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:42 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:42 executing program 5: symlink(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) fstat(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x20, &(0x7f0000000200)={[{@metacopy_off}, {@xino_off}, {@workdir={'workdir', 0x3d, './file0'}}, {@xino_off}, {@xino_on}, {@workdir={'workdir', 0x3d, './file0'}}], [{@obj_user={'obj_user', 0x3d, '/dev/zero\x00'}}, {@measure}, {@appraise_type}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x34, 0xdff52c8a3afbd5be, 0x39, 0x38, 0x61, 0x2f, 0x37], 0x2d, [0x66, 0x38, 0x38, 0x52], 0x2d, [0x65, 0x38, 0x31, 0x65], 0x2d, [0x62, 0x64, 0x35, 0x31], 0x2d, [0x63, 0x60, 0x61, 0x30, 0x63, 0x30, 0x76, 0x36]}}}, {@euid_gt={'euid>', r0}}, {@obj_user={'obj_user', 0x3d, '\xc9['}}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) linkat(r1, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0xae, &(0x7f0000000440)={@multicast, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x78, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0xb, "a78ce540cd4f791153d5dea6b259fe8000000000000023493b87aa0568f00b1c71a8242373244ad2439adc07df0a69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81802"}, {0x0, 0x1, "ffffefffa0f8ca1cc8000800"}]}}}}}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) 01:27:42 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1106) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x800, 0x0, 0x0, 0x0, 0xfffff}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0xfd, 0x50, 0x81, 0x9, 0x0, 0x9, 0x28040, 0x9, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x3, 0x7fffffff}, 0x400, 0x800, 0xfffffff9, 0x6, 0xfffffffffffffc01, 0xdd, 0x1f, 0x0, 0x10001}, 0xffffffffffffffff, 0xf, r2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, r0, 0x0, 0x0, 0x0}, 0x30) r3 = gettid() r4 = perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x800, 0x0, 0x0, 0x100000, 0xfffff}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0xc, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@initr0={0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x1b}, @exit, @call={0x85, 0x0, 0x0, 0x29}, @map_val={0x18, 0x9, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xd, 0x401, 0x2}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r3, r4, 0x0, 0x0, 0x0}, 0x30) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) unshare(0x40000000) 01:27:43 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) pipe(&(0x7f00000000c0)) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) writev(r5, &(0x7f00000006c0)=[{&(0x7f0000000000)='0', 0x1}, {0x0}], 0x2) flock(r5, 0x0) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46020004000410004000c4a40003003e080139a594343d0000e1ee000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x0, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:43 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:43 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1107) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:43 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031400000002000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000050d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x400000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) 01:27:43 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:43 executing program 0: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031400000402000000000f0000000000000000004000000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 01:27:43 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1108) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:43 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:43 executing program 5: r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r0, &(0x7f00000001c0)=0x3f, 0x3) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0x7fffffff, 0x101) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b5b083b3100003100000000000000006d000000000000000000000000000000400000000000000000000000000000000000000000003800"/120], 0x78) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r3, &(0x7f0000000980)='./file3\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r3, &(0x7f0000000100)='./file3\x00', r3, &(0x7f0000000200)='./file0\x00') ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000080)={"274a0279270dd12ba9351d3fbf4dd79d", 0x0, 0x0, {0x6000, 0x7}, {0x8, 0xfff}, 0x2, [0x4, 0x2b8, 0x5af00000, 0x7, 0x8000000008, 0x744, 0xff, 0x9, 0x5, 0x7, 0x120, 0x10001, 0x10000, 0xb442, 0x200, 0x7]}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, &(0x7f0000000840)={{r0}, r4, 0x4, @unused=[0x5, 0x1, 0x3, 0x3], @devid}) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) r6 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') sendfile(r5, r6, 0x0, 0x800000080004103) open(&(0x7f0000000040)='./file0\x00', 0x88000, 0x181) 01:27:43 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, 0xa000, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x4000, 0x0, 0xffffff01, 0x6, 0x0, 0x3d9}, 0x0, 0x8, r0, 0xa) r1 = gettid() clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1f \xce1\xc9\x9f\xb0\x14\xc2\xeb\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\xb2cY', 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000410004000c4a40003003e080039a59434c80a00100a20000000000000000000"], 0x3c) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x10000000, 0x7, 0x1f, 0x3, 0x3, 0x1, 0x4, 0x8}, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1109) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:27:43 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r0, &(0x7f00000001c0)=0x3f, 0x3) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0x7fffffff, 0x101) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b5b083b3100003100000000000000006d000000000000000000000000000000400000000000000000000000000000000000000000003800"/120], 0x78) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r3, &(0x7f0000000980)='./file3\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r3, &(0x7f0000000100)='./file3\x00', r3, &(0x7f0000000200)='./file0\x00') ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000080)={"274a0279270dd12ba9351d3fbf4dd79d", 0x0, 0x0, {0x6000, 0x7}, {0x8, 0xfff}, 0x2, [0x4, 0x2b8, 0x5af00000, 0x7, 0x8000000008, 0x744, 0xff, 0x9, 0x5, 0x7, 0x120, 0x10001, 0x10000, 0xb442, 0x200, 0x7]}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, &(0x7f0000000840)={{r0}, r4, 0x4, @unused=[0x5, 0x1, 0x3, 0x3], @devid}) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) r6 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') sendfile(r5, r6, 0x0, 0x800000080004103) open(&(0x7f0000000040)='./file0\x00', 0x88000, 0x181) [ 778.340257][T29140] device bridge_slave_1 left promiscuous mode [ 778.346546][T29140] bridge0: port 2(bridge_slave_1) entered disabled state [ 778.370395][T29140] device bridge_slave_0 left promiscuous mode [ 778.376583][T29140] bridge0: port 1(bridge_slave_0) entered disabled state [ 779.923471][ T7403] cgroup1: Unknown subsys name 'perf_event' [ 779.930182][ T7403] cgroup1: Unknown subsys name 'net_cls' [ 780.005074][ T7403] bridge0: port 1(bridge_slave_0) entered blocking state [ 780.012188][ T7403] bridge0: port 1(bridge_slave_0) entered disabled state [ 780.020770][ T7403] device bridge_slave_0 entered promiscuous mode [ 780.028202][ T7403] bridge0: port 2(bridge_slave_1) entered blocking state [ 780.036255][ T7403] bridge0: port 2(bridge_slave_1) entered disabled state [ 780.044593][ T7403] device bridge_slave_1 entered promiscuous mode [ 780.118579][ T7403] bridge0: port 2(bridge_slave_1) entered blocking state [ 780.125814][ T7403] bridge0: port 2(bridge_slave_1) entered forwarding state [ 780.133334][ T7403] bridge0: port 1(bridge_slave_0) entered blocking state [ 780.140726][ T7403] bridge0: port 1(bridge_slave_0) entered forwarding state [ 780.182134][ T8028] bridge0: port 1(bridge_slave_0) entered disabled state [ 780.190907][ T8028] bridge0: port 2(bridge_slave_1) entered disabled state [ 780.198528][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 780.207515][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 780.231415][ T3893] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 780.241070][ T3893] bridge0: port 1(bridge_slave_0) entered blocking state [ 780.248720][ T3893] bridge0: port 1(bridge_slave_0) entered forwarding state [ 780.257444][ T3893] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 780.267972][ T3893] bridge0: port 2(bridge_slave_1) entered blocking state [ 780.275037][ T3893] bridge0: port 2(bridge_slave_1) entered forwarding state [ 780.302009][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 780.310890][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 780.331929][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 780.341330][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 780.360892][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 780.379774][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 780.388483][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 781.089925][ T1795] device bridge_slave_1 left promiscuous mode [ 781.096182][ T1795] bridge0: port 2(bridge_slave_1) entered disabled state [ 781.119951][ T1795] device bridge_slave_0 left promiscuous mode [ 781.126216][ T1795] bridge0: port 1(bridge_slave_0) entered disabled state [ 782.442741][ T7411] cgroup1: Unknown subsys name 'perf_event' [ 782.449138][ T7411] cgroup1: Unknown subsys name 'net_cls' [ 782.524372][ T7411] bridge0: port 1(bridge_slave_0) entered blocking state [ 782.531490][ T7411] bridge0: port 1(bridge_slave_0) entered disabled state [ 782.539181][ T7411] device bridge_slave_0 entered promiscuous mode [ 782.547933][ T7411] bridge0: port 2(bridge_slave_1) entered blocking state [ 782.555720][ T7411] bridge0: port 2(bridge_slave_1) entered disabled state [ 782.564179][ T7411] device bridge_slave_1 entered promiscuous mode [ 782.640906][ T7411] bridge0: port 2(bridge_slave_1) entered blocking state [ 782.648137][ T7411] bridge0: port 2(bridge_slave_1) entered forwarding state [ 782.655649][ T7411] bridge0: port 1(bridge_slave_0) entered blocking state [ 782.662938][ T7411] bridge0: port 1(bridge_slave_0) entered forwarding state [ 782.701227][ T146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 782.710562][ T146] bridge0: port 1(bridge_slave_0) entered disabled state [ 782.717966][ T146] bridge0: port 2(bridge_slave_1) entered disabled state [ 782.741930][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 782.751802][ T5223] bridge0: port 1(bridge_slave_0) entered blocking state [ 782.758956][ T5223] bridge0: port 1(bridge_slave_0) entered forwarding state [ 782.768748][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 782.780101][ T5223] bridge0: port 2(bridge_slave_1) entered blocking state [ 782.788441][ T5223] bridge0: port 2(bridge_slave_1) entered forwarding state [ 782.810822][ T146] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 782.821076][ T146] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 782.842725][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 782.852219][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 782.871093][ T146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 782.891425][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 782.902793][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 783.589806][ T1795] device bridge_slave_1 left promiscuous mode [ 783.596082][ T1795] bridge0: port 2(bridge_slave_1) entered disabled state [ 783.613860][ T1795] device bridge_slave_0 left promiscuous mode [ 783.630801][ T1795] bridge0: port 1(bridge_slave_0) entered disabled state [ 784.991872][ T7419] cgroup1: Unknown subsys name 'perf_event' [ 784.999786][ T7419] cgroup1: Unknown subsys name 'net_cls' [ 785.075813][ T7419] bridge0: port 1(bridge_slave_0) entered blocking state [ 785.083958][ T7419] bridge0: port 1(bridge_slave_0) entered disabled state [ 785.092082][ T7419] device bridge_slave_0 entered promiscuous mode [ 785.101982][ T7419] bridge0: port 2(bridge_slave_1) entered blocking state [ 785.110199][ T7419] bridge0: port 2(bridge_slave_1) entered disabled state [ 785.118215][ T7419] device bridge_slave_1 entered promiscuous mode [ 785.193795][ T7419] bridge0: port 2(bridge_slave_1) entered blocking state [ 785.202076][ T7419] bridge0: port 2(bridge_slave_1) entered forwarding state [ 785.210223][ T7419] bridge0: port 1(bridge_slave_0) entered blocking state [ 785.218258][ T7419] bridge0: port 1(bridge_slave_0) entered forwarding state [ 785.256084][ T146] bridge0: port 1(bridge_slave_0) entered disabled state [ 785.264376][ T146] bridge0: port 2(bridge_slave_1) entered disabled state [ 785.272806][ T146] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 785.282338][ T146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 785.299876][ T146] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 785.310035][ T146] bridge0: port 1(bridge_slave_0) entered blocking state [ 785.318032][ T146] bridge0: port 1(bridge_slave_0) entered forwarding state [ 785.328672][ T146] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 785.339106][ T146] bridge0: port 2(bridge_slave_1) entered blocking state [ 785.350597][ T146] bridge0: port 2(bridge_slave_1) entered forwarding state [ 785.380215][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 785.388539][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 785.410664][ T146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 785.430173][ T7399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 785.451875][ T146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 785.469936][ T146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 785.478630][ T146] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 786.289525][T29140] device bridge_slave_1 left promiscuous mode [ 786.296963][T29140] bridge0: port 2(bridge_slave_1) entered disabled state [ 786.319485][T29140] device bridge_slave_0 left promiscuous mode [ 786.326090][T29140] bridge0: port 1(bridge_slave_0) entered disabled state [ 787.575107][ T7427] cgroup1: Unknown subsys name 'perf_event' [ 787.581597][ T7427] cgroup1: Unknown subsys name 'net_cls' [ 787.655027][ T7427] bridge0: port 1(bridge_slave_0) entered blocking state [ 787.662656][ T7427] bridge0: port 1(bridge_slave_0) entered disabled state [ 787.670679][ T7427] device bridge_slave_0 entered promiscuous mode [ 787.678023][ T7427] bridge0: port 2(bridge_slave_1) entered blocking state [ 787.685433][ T7427] bridge0: port 2(bridge_slave_1) entered disabled state [ 787.693938][ T7427] device bridge_slave_1 entered promiscuous mode [ 787.768407][ T7427] bridge0: port 2(bridge_slave_1) entered blocking state [ 787.775582][ T7427] bridge0: port 2(bridge_slave_1) entered forwarding state [ 787.783168][ T7427] bridge0: port 1(bridge_slave_0) entered blocking state [ 787.790785][ T7427] bridge0: port 1(bridge_slave_0) entered forwarding state [ 787.828771][ T7399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 787.837760][ T7399] bridge0: port 1(bridge_slave_0) entered disabled state [ 787.846571][ T7399] bridge0: port 2(bridge_slave_1) entered disabled state [ 787.871824][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 787.880968][ T5223] bridge0: port 1(bridge_slave_0) entered blocking state [ 787.888167][ T5223] bridge0: port 1(bridge_slave_0) entered forwarding state [ 787.897582][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 787.907896][ T5223] bridge0: port 2(bridge_slave_1) entered blocking state [ 787.915804][ T5223] bridge0: port 2(bridge_slave_1) entered forwarding state [ 787.924693][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 787.939347][ T7399] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 787.959272][T29142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 787.974872][T29142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 787.994718][T29142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 788.013630][T29142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 788.032670][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 788.709232][ T1795] device bridge_slave_1 left promiscuous mode [ 788.719045][ T1795] bridge0: port 2(bridge_slave_1) entered disabled state [ 788.736964][ T1795] device bridge_slave_0 left promiscuous mode [ 788.749153][ T1795] bridge0: port 1(bridge_slave_0) entered disabled state [ 790.234778][ T7435] cgroup1: Unknown subsys name 'perf_event' [ 790.241390][ T7435] cgroup1: Unknown subsys name 'net_cls' [ 790.315989][ T7435] bridge0: port 1(bridge_slave_0) entered blocking state [ 790.324233][ T7435] bridge0: port 1(bridge_slave_0) entered disabled state [ 790.333168][ T7435] device bridge_slave_0 entered promiscuous mode [ 790.341927][ T7435] bridge0: port 2(bridge_slave_1) entered blocking state [ 790.349570][ T7435] bridge0: port 2(bridge_slave_1) entered disabled state [ 790.357797][ T7435] device bridge_slave_1 entered promiscuous mode [ 790.433047][ T7435] bridge0: port 2(bridge_slave_1) entered blocking state [ 790.440624][ T7435] bridge0: port 2(bridge_slave_1) entered forwarding state [ 790.448431][ T7435] bridge0: port 1(bridge_slave_0) entered blocking state [ 790.456020][ T7435] bridge0: port 1(bridge_slave_0) entered forwarding state [ 790.495053][ T8028] bridge0: port 1(bridge_slave_0) entered disabled state [ 790.503459][ T8028] bridge0: port 2(bridge_slave_1) entered disabled state [ 790.513955][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 790.523229][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 790.540707][ T3893] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 790.549480][ T3893] bridge0: port 1(bridge_slave_0) entered blocking state [ 790.557466][ T3893] bridge0: port 1(bridge_slave_0) entered forwarding state [ 790.566816][ T3893] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 790.576718][ T3893] bridge0: port 2(bridge_slave_1) entered blocking state [ 790.585104][ T3893] bridge0: port 2(bridge_slave_1) entered forwarding state [ 790.609809][T29142] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 790.619724][T29142] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 790.639595][T29142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 790.659157][T29142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 790.679510][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 790.709848][T29142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 790.722600][T29142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 791.349188][ T1795] device bridge_slave_1 left promiscuous mode [ 791.358870][ T1795] bridge0: port 2(bridge_slave_1) entered disabled state [ 791.377100][ T1795] device bridge_slave_0 left promiscuous mode [ 791.389026][ T1795] bridge0: port 1(bridge_slave_0) entered disabled state [ 792.796470][ T7443] cgroup1: Unknown subsys name 'perf_event' [ 792.803757][ T7443] cgroup1: Unknown subsys name 'net_cls' [ 792.879031][ T7443] bridge0: port 1(bridge_slave_0) entered blocking state [ 792.887531][ T7443] bridge0: port 1(bridge_slave_0) entered disabled state [ 792.896748][ T7443] device bridge_slave_0 entered promiscuous mode [ 792.905087][ T7443] bridge0: port 2(bridge_slave_1) entered blocking state [ 792.913397][ T7443] bridge0: port 2(bridge_slave_1) entered disabled state [ 792.922429][ T7443] device bridge_slave_1 entered promiscuous mode [ 792.998888][ T7443] bridge0: port 2(bridge_slave_1) entered blocking state [ 793.006776][ T7443] bridge0: port 2(bridge_slave_1) entered forwarding state [ 793.015097][ T7443] bridge0: port 1(bridge_slave_0) entered blocking state [ 793.023862][ T7443] bridge0: port 1(bridge_slave_0) entered forwarding state [ 793.065601][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 793.075723][ T8028] bridge0: port 1(bridge_slave_0) entered disabled state [ 793.085464][ T8028] bridge0: port 2(bridge_slave_1) entered disabled state [ 793.111419][ T3893] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 793.121691][ T3893] bridge0: port 1(bridge_slave_0) entered blocking state [ 793.129047][ T3893] bridge0: port 1(bridge_slave_0) entered forwarding state [ 793.140072][ T3893] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 793.149647][ T3893] bridge0: port 2(bridge_slave_1) entered blocking state [ 793.156878][ T3893] bridge0: port 2(bridge_slave_1) entered forwarding state [ 793.178883][ T3893] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 793.187562][ T3893] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 793.209284][ T3893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 793.220299][ T3893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 793.240286][ T3893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 793.259627][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 793.268468][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 793.878857][ T1795] device bridge_slave_1 left promiscuous mode [ 793.888660][ T1795] bridge0: port 2(bridge_slave_1) entered disabled state [ 793.916636][ T1795] device bridge_slave_0 left promiscuous mode [ 793.938562][ T1795] bridge0: port 1(bridge_slave_0) entered disabled state [ 795.386695][ T7451] cgroup1: Unknown subsys name 'perf_event' [ 795.393377][ T7451] cgroup1: Unknown subsys name 'net_cls' [ 795.469448][ T7451] bridge0: port 1(bridge_slave_0) entered blocking state [ 795.476500][ T7451] bridge0: port 1(bridge_slave_0) entered disabled state [ 795.484688][ T7451] device bridge_slave_0 entered promiscuous mode [ 795.492393][ T7451] bridge0: port 2(bridge_slave_1) entered blocking state [ 795.500419][ T7451] bridge0: port 2(bridge_slave_1) entered disabled state [ 795.509246][ T7451] device bridge_slave_1 entered promiscuous mode [ 795.587119][ T7451] bridge0: port 2(bridge_slave_1) entered blocking state [ 795.594294][ T7451] bridge0: port 2(bridge_slave_1) entered forwarding state [ 795.602069][ T7451] bridge0: port 1(bridge_slave_0) entered blocking state [ 795.609481][ T7451] bridge0: port 1(bridge_slave_0) entered forwarding state [ 795.649600][ T8028] bridge0: port 1(bridge_slave_0) entered disabled state [ 795.657347][ T8028] bridge0: port 2(bridge_slave_1) entered disabled state [ 795.667244][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 795.676580][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 795.699951][ T3893] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 795.709134][ T3893] bridge0: port 1(bridge_slave_0) entered blocking state [ 795.716338][ T3893] bridge0: port 1(bridge_slave_0) entered forwarding state [ 795.725397][ T3893] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 795.736438][ T3893] bridge0: port 2(bridge_slave_1) entered blocking state [ 795.744056][ T3893] bridge0: port 2(bridge_slave_1) entered forwarding state [ 795.768903][ T3893] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 795.778074][ T3893] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 795.799651][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 795.807733][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 795.830522][ T3893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 795.851230][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 795.863561][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 796.558528][T29140] device bridge_slave_1 left promiscuous mode [ 796.565342][T29140] bridge0: port 2(bridge_slave_1) entered disabled state [ 796.588706][T29140] device bridge_slave_0 left promiscuous mode [ 796.615654][T29140] bridge0: port 1(bridge_slave_0) entered disabled state [ 797.888672][ T7460] cgroup1: Unknown subsys name 'perf_event' [ 797.895111][ T7460] cgroup1: Unknown subsys name 'net_cls' [ 797.971553][ T7460] bridge0: port 1(bridge_slave_0) entered blocking state [ 797.979047][ T7460] bridge0: port 1(bridge_slave_0) entered disabled state [ 797.987083][ T7460] device bridge_slave_0 entered promiscuous mode [ 797.995421][ T7460] bridge0: port 2(bridge_slave_1) entered blocking state [ 798.002936][ T7460] bridge0: port 2(bridge_slave_1) entered disabled state [ 798.010919][ T7460] device bridge_slave_1 entered promiscuous mode [ 798.086768][ T7460] bridge0: port 2(bridge_slave_1) entered blocking state [ 798.093944][ T7460] bridge0: port 2(bridge_slave_1) entered forwarding state [ 798.101621][ T7460] bridge0: port 1(bridge_slave_0) entered blocking state [ 798.108879][ T7460] bridge0: port 1(bridge_slave_0) entered forwarding state [ 798.147108][T29142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 798.156417][T29142] bridge0: port 1(bridge_slave_0) entered disabled state [ 798.165518][T29142] bridge0: port 2(bridge_slave_1) entered disabled state [ 798.189954][ T3893] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 798.199079][ T3893] bridge0: port 1(bridge_slave_0) entered blocking state [ 798.206551][ T3893] bridge0: port 1(bridge_slave_0) entered forwarding state [ 798.215710][ T3893] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 798.226113][ T3893] bridge0: port 2(bridge_slave_1) entered blocking state [ 798.233669][ T3893] bridge0: port 2(bridge_slave_1) entered forwarding state [ 798.258663][ T3893] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 798.266957][ T3893] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 798.288765][ T3893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 798.297061][ T3893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 798.319244][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 798.337599][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 798.346836][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 799.118435][ T4031] device bridge_slave_1 left promiscuous mode [ 799.124962][ T4031] bridge0: port 2(bridge_slave_1) entered disabled state [ 799.158428][ T4031] device bridge_slave_0 left promiscuous mode [ 799.165224][ T4031] bridge0: port 1(bridge_slave_0) entered disabled state [ 800.503059][ T7469] cgroup1: Unknown subsys name 'perf_event' [ 800.510083][ T7469] cgroup1: Unknown subsys name 'net_cls' [ 800.586454][ T7469] bridge0: port 1(bridge_slave_0) entered blocking state [ 800.594145][ T7469] bridge0: port 1(bridge_slave_0) entered disabled state [ 800.603152][ T7469] device bridge_slave_0 entered promiscuous mode [ 800.611578][ T7469] bridge0: port 2(bridge_slave_1) entered blocking state [ 800.619570][ T7469] bridge0: port 2(bridge_slave_1) entered disabled state [ 800.628717][ T7469] device bridge_slave_1 entered promiscuous mode [ 800.706862][ T7469] bridge0: port 2(bridge_slave_1) entered blocking state [ 800.715013][ T7469] bridge0: port 2(bridge_slave_1) entered forwarding state [ 800.722795][ T7469] bridge0: port 1(bridge_slave_0) entered blocking state [ 800.730022][ T7469] bridge0: port 1(bridge_slave_0) entered forwarding state [ 800.771542][ T5223] bridge0: port 1(bridge_slave_0) entered disabled state [ 800.780297][ T5223] bridge0: port 2(bridge_slave_1) entered disabled state [ 800.790473][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 800.799963][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 800.818675][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 800.827220][ T5223] bridge0: port 1(bridge_slave_0) entered blocking state [ 800.835025][ T5223] bridge0: port 1(bridge_slave_0) entered forwarding state [ 800.845297][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 800.855041][ T5223] bridge0: port 2(bridge_slave_1) entered blocking state [ 800.863035][ T5223] bridge0: port 2(bridge_slave_1) entered forwarding state [ 800.888937][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 800.897401][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 800.919584][ T146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 800.933991][T29142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 800.952757][T29142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 800.972789][T29142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 800.989199][T29142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 801.608101][ T1795] device bridge_slave_1 left promiscuous mode [ 801.614382][ T1795] bridge0: port 2(bridge_slave_1) entered disabled state [ 801.667669][ T1795] device bridge_slave_0 left promiscuous mode [ 801.673874][ T1795] bridge0: port 1(bridge_slave_0) entered disabled state [ 803.168638][ T7477] cgroup1: Unknown subsys name 'perf_event' [ 803.176541][ T7477] cgroup1: Unknown subsys name 'net_cls' [ 803.253172][ T7477] bridge0: port 1(bridge_slave_0) entered blocking state [ 803.261281][ T7477] bridge0: port 1(bridge_slave_0) entered disabled state [ 803.272701][ T7477] device bridge_slave_0 entered promiscuous mode [ 803.281857][ T7477] bridge0: port 2(bridge_slave_1) entered blocking state [ 803.290399][ T7477] bridge0: port 2(bridge_slave_1) entered disabled state [ 803.299446][ T7477] device bridge_slave_1 entered promiscuous mode [ 803.376354][ T7477] bridge0: port 2(bridge_slave_1) entered blocking state [ 803.383984][ T7477] bridge0: port 2(bridge_slave_1) entered forwarding state [ 803.392552][ T7477] bridge0: port 1(bridge_slave_0) entered blocking state [ 803.400449][ T7477] bridge0: port 1(bridge_slave_0) entered forwarding state [ 803.442867][ T146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 803.452871][ T146] bridge0: port 1(bridge_slave_0) entered disabled state [ 803.461851][ T146] bridge0: port 2(bridge_slave_1) entered disabled state [ 803.480473][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 803.489919][ T5223] bridge0: port 1(bridge_slave_0) entered blocking state [ 803.497491][ T5223] bridge0: port 1(bridge_slave_0) entered forwarding state [ 803.506043][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 803.517274][ T5223] bridge0: port 2(bridge_slave_1) entered blocking state [ 803.524346][ T5223] bridge0: port 2(bridge_slave_1) entered forwarding state [ 803.548559][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 803.556916][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 803.580454][ T7399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 803.598318][ T7399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 803.618036][ T7399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 803.627107][ T7399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 803.648533][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 803.657237][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 803.669160][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 803.679153][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 804.397977][ T4031] device bridge_slave_1 left promiscuous mode [ 804.404277][ T4031] bridge0: port 2(bridge_slave_1) entered disabled state [ 804.447971][ T4031] device bridge_slave_0 left promiscuous mode [ 804.454344][ T4031] bridge0: port 1(bridge_slave_0) entered disabled state [ 805.882453][ T7487] cgroup1: Unknown subsys name 'perf_event' [ 805.889121][ T7487] cgroup1: Unknown subsys name 'net_cls' [ 805.966046][ T7487] bridge0: port 1(bridge_slave_0) entered blocking state [ 805.974483][ T7487] bridge0: port 1(bridge_slave_0) entered disabled state [ 805.983459][ T7487] device bridge_slave_0 entered promiscuous mode [ 805.991824][ T7487] bridge0: port 2(bridge_slave_1) entered blocking state [ 806.000430][ T7487] bridge0: port 2(bridge_slave_1) entered disabled state [ 806.008882][ T7487] device bridge_slave_1 entered promiscuous mode [ 806.083363][ T7487] bridge0: port 2(bridge_slave_1) entered blocking state [ 806.090644][ T7487] bridge0: port 2(bridge_slave_1) entered forwarding state [ 806.098248][ T7487] bridge0: port 1(bridge_slave_0) entered blocking state [ 806.105615][ T7487] bridge0: port 1(bridge_slave_0) entered forwarding state [ 806.144296][ T7399] bridge0: port 1(bridge_slave_0) entered disabled state [ 806.152932][ T7399] bridge0: port 2(bridge_slave_1) entered disabled state [ 806.163245][ T7399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 806.172591][ T7399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 806.198839][ T7399] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 806.208860][ T7399] bridge0: port 1(bridge_slave_0) entered blocking state [ 806.217331][ T7399] bridge0: port 1(bridge_slave_0) entered forwarding state [ 806.227133][ T7399] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 806.236720][ T7399] bridge0: port 2(bridge_slave_1) entered blocking state [ 806.243881][ T7399] bridge0: port 2(bridge_slave_1) entered forwarding state [ 806.252508][ T7399] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 806.277868][ T7399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 806.286730][ T7399] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 806.308199][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 806.329045][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 806.348845][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 806.359052][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 2021/06/26 01:28:12 executor 3 failed 11 times: executor 3: exit status 67 SYZFAIL: mmap of input file failed (errno 22: Invalid argument) SYZFAIL: child failed (errno 0: Success) loop exited with status 67 [ 807.627934][ T1795] device bridge_slave_1 left promiscuous mode [ 807.634291][ T1795] bridge0: port 2(bridge_slave_1) entered disabled state [ 807.642125][ T1795] device bridge_slave_0 left promiscuous mode [ 807.648642][ T1795] bridge0: port 1(bridge_slave_0) entered disabled state