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"]}, 0x1138}, {&(0x7f0000001640)={0x134, 0x2d, 0x4, 0x70bd25, 0x25dfdbff, "", [@typed={0x8, 0x48, @uid=r5}, @generic="ccecd26baad47b0427123607ae83ba774c01accde7f5a4eb3c07d51d8f2b76f7dacb81c37ee8feb9a93e7ed566cd25915bd1fb03b2ed0b83943d18120b8c0ec7540993490f341bbea90c30eaae2f59aa013da3c5dec9717861e23b946660cbfbb8e455bc988b246b75634fa6639dd3eccaad11b7d3b21dbeeaad627034e0ae4c583b9eceee555412d2ae11c41f33761f40e39e54802aa3f801d894ced8b48ce35017e9a5946c4f220b00c8bb0c98da208d6c35288dc422", @nested={0x64, 0x2e, [@typed={0x8, 0x62, @str='\x8e!\x00'}, @typed={0x8, 0x5f, @pid=r1}, @generic="1a2a1810efa4fe045f20072d3a33a5d66f0f6880a0ab51991ec30ff8ba0799696ad2a51ae80eb51e4f72376a50b30a3ef3a6", @typed={0x14, 0x3a, @ipv6=@mcast1}, @typed={0x8, 0x5e, @uid=r6}]}]}, 0x134}, {&(0x7f00000018c0)={0x33c, 0x31, 0x0, 0x70bd28, 0x25dfdbfc, "", [@typed={0xc, 0x29, @u64=0x4053}, @generic="2a3f960cac5836828739fe8dfeb92d1ed8b5ca9aeb35e43e076d179368c705bde6dc10a81ec415c5ba31d85c849b7b", @nested={0xf0, 0x94, [@typed={0x4, 0x41}, @generic="0e7eddb333b4e7a8a337f5758802997c7132f86eb85d14ace435e530d3271ec2c2cf50ed434807630c4716cc8c2ebb8af95df9034f8c3b847ef9f73aa00fe20f56e1459a3435cff8e7ac0e128bed506d9595ef8170cf9226e0107e7a8acd7943aec40bfbc125acb2385663c794255e31c387299fa5754da20e7e3e19f2262aae49d0521f82f2f9f6811b7c33968aab85aa209a71f98c4369e2070a84e2e49ecdd25754b043d2058f40bbd254b3d209d8b894682209df84189a387b60e5d60edb78618044f98bd4f52726050a18cf2a40", @typed={0x8, 0x39, @fd=r0}, @typed={0x10, 0x8d, @str='/dev/amidi#\x00'}, @generic]}, @typed={0x8, 0x11, @uid=r7}, @generic="3c22e425f585d87ea13352950304f47af44002d918847c8f02a3873fd64b99301ca5d02991f55a308d20", @nested={0x50, 0x7c, [@generic="87f96ae0afe62df15ed2981d65f01062490e2346a44e5e78ec4662f04168d2073a7a48b47b14903a87c3e8", @typed={0x8, 0x71, @pid=r1}, @typed={0x10, 0x94, @str='/dev/amidi#\x00'}, @typed={0x8, 0x96, @ipv4=@broadcast}]}, @nested={0x17c, 0x12, [@generic="6a036c499a03e99b8020dc549eb7e5b850f60a81610ce31534a02847f2dd58d56bc0be82e8ecee9df6da21c7ea3c5a8cc3d25bc92d82a88c8e25e4df3ef869ffdd31e98c8373e61f1bd44114baa53016ac528177b56db2693620b8c3255bed6842e9fa70be1e785a7b66a245a82ebe3941573b139d27f3f934550cb18ca99bc76b4eaa67aed625b01715addfabcc868c2e79813ebc06375d315a9c8ebd2414530647b00e982e4fdb3741353f93b7db2e48aeff839a83d93d", @typed={0x8, 0x3e, @uid=r8}, @typed={0x8, 0x2e, @u32=0x7}, @typed={0x8, 0x30, @uid=r9}, @generic="587bea8901c017d2c46ad0b4c368af8932fe0437a21993ea95a993acc9a40b4d7aa8d167d91387ecf493af2af6c1358b1de16782e42f9b254401bd6f46261c00e1b66277d117cf9126caa8180a0aed413a51fdb3db8579f5019b4e6bccbf3f5050b11e4b0dbb1e4fb974bb029d61f22e45bcf22dcd764d5e342cd019744e80e752a164601b97b6c12c74943ae3c06821fd48b048353ba3fd4bb5222d7c0aeb02c1bda6f7e4"]}]}, 0x33c}, {&(0x7f0000001c00)={0x150, 0x19, 0x8, 0x70bd2a, 0x25dfdbff, "", [@generic="86b646b66458f642b2d56d67a7cd8bfe917f16574302677993b2b97da10b2dc27c2ef913cf1475a26a0502532dca1d642f7969b3f395cf4bb1b295dc11619d5a1865fcf24bfff77e9d0351aade9196b74e83a666b028340e79f4fa68b60e011f446727e48266f2d023dc6044b99c87026cbaf5939d329f14322db1fba9fe05ce227045a3dd29f228cefa49f2209de71c2be7", @typed={0x8, 0x59, @ipv4=@multicast2}, @generic="ac3dbe474ede6f14762278a20983a5f7a046bb9fad199f3484599d03f47bbac89a067a7516ba64eb540f4d9704b0a80daa24fd2e8d9e3f424f51597479db2967ff2e313ccba921c31820f737e7213a02ae143e1dac5155ad9009497c4495184856bfea213675fb47bd3bb8628d562bc52bb7ce99546eaa5e8c4b4f636117026e38d9a9f82dec7cf3197c26725d86032e39a744bbea004b2c46cf3ff8c3276880d064143d1197"]}, 0x150}, {&(0x7f0000001d80)={0xf8, 0x1b, 0xa00, 0x70bd2a, 0x25dfdbff, "", [@typed={0xb8, 0x15, @binary="c0c9222e7093a1be913100262f428db82f315bc38208f9cbfbc361186cc3ac806c6ed4cd8b99c9f2ac977919d2a52ca722f8a6aef8ee419568c68ea5b1746060e2c905bd09ce414715d1209f72ae95b3350693c7338493c42a07d7a901885ea4b1dfa9ed127e94be20b08ac40d9ccf455c2f660cf769647e661d63b8fce20cc2459f235f678bc3f626728ab3cc604cd8cba10e214c0ce6dd37c35e0448ecb89884d430748e542cb10e3e7d678f17e9300a2f"}, @generic="863224c939ffb6e922df34d1eac8a93caaa27d4988c5ebdf9e285d2e5a34beffee", @typed={0xc, 0x94, @u64=0x3}]}, 0xf8}], 0x5, &(0x7f0000001f00)=[@rights={{0x28, 0x1, 0x1, [r2, r2, r0, r0, r2, r2]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r2, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r2, r0, r2]}}, @rights={{0x1c, 0x1, 0x1, [r2, r2, r0]}}], 0x88, 0x1}, 0x40) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000002000), &(0x7f0000002040)=0x4) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f0000002080)=0x1, 0x4) recvmmsg(r2, &(0x7f00000038c0)=[{{&(0x7f00000020c0)=@xdp, 0x80, &(0x7f0000003140)=[{&(0x7f0000002140)=""/4096, 0x1000}], 0x1, &(0x7f0000003180)=""/161, 0xa1}, 0x2}, {{&(0x7f0000003240)=@alg, 0x80, &(0x7f00000035c0)=[{&(0x7f00000032c0)=""/90, 0x5a}, {&(0x7f0000003340)}, {&(0x7f0000003380)=""/71, 0x47}, {&(0x7f0000003400)=""/18, 0x12}, {&(0x7f0000003440)=""/108, 0x6c}, {&(0x7f00000034c0)=""/120, 0x78}, {&(0x7f0000003540)=""/103, 0x67}], 0x7}, 0x7f}, {{&(0x7f0000003640)=@caif=@util, 0x80, &(0x7f0000003800)=[{&(0x7f00000036c0)=""/89, 0x59}, {&(0x7f0000003740)=""/28, 0x1c}, {&(0x7f0000003780)=""/100, 0x64}], 0x3, &(0x7f0000003840)=""/112, 0x70}, 0xfffffffffffff11a}], 0x3, 0x40000000, &(0x7f0000003980)={0x77359400}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000001, 0x5050, r2, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x8000) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000003a80)={'broute\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000039c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x0, [{}]}, 0x88) ioctl$SG_GET_NUM_WAITING(r2, 0x227d, &(0x7f0000003b40)) 07:54:15 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r1, 0x5d07, 0x5}, 0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000540), &(0x7f0000000580)=0x14) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) io_uring_register$IORING_UNREGISTER_FILES(r3, 0x3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000600)={r1, @in={{0x2, 0x4e22, @loopback}}}, 0x84) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f00000006c0)=0x1) socket$unix(0x1, 0x5, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x113, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000780)={0x4, 0x8, 0xfa00, {r4}}, 0x10) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000007c0)=@int=0x5, 0x4) ioctl$CAPI_INSTALLED(r0, 0x80024322) syz_genetlink_get_family_id$tipc2(&(0x7f0000000840)='TIPCv2\x00') 07:54:15 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r1, 0x5d07, 0x5}, 0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000540), &(0x7f0000000580)=0x14) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) io_uring_register$IORING_UNREGISTER_FILES(r3, 0x3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000600)={r1, @in={{0x2, 0x4e22, @loopback}}}, 0x84) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f00000006c0)=0x1) socket$unix(0x1, 0x5, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r3, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:15 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = geteuid() stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001840)={0x0, 0x0}, &(0x7f0000001880)=0xc) sendmsg$netlink(r2, &(0x7f0000001fc0)={&(0x7f00000002c0)=@proc={0x10, 0x0, 0x25dfdbfd, 0x8280}, 0xc, &(0x7f0000001e80)=[{&(0x7f0000000300)={0x1138, 0x36, 0x200, 0x70bd2d, 0x25dfdbfe, "", [@generic="1c53e8a6f1cdb5ff7be4dc8ec71bedbe2c2fd721fd7fd272577d6af3e5738d412cc426c7320e7b784c685f5154fbcef783af1db492a9deae1602ec0c72cafb1024ac16b2539205ace26ada3ff602c29c4552b97342c3245845edc8620737524aced48855ce003f76776f1b736b704318ac2fef835751a964caf7ecf6e0a2d0f0668cdefb3e23c549112357ee29f54d788fff9822215006bd1f85404b83862055aab50f495aa07ffb662b8ff65d441c0e777f0d27f278799c685c0cfaf347e2d6a105969e75df2e16bc50bba44a0ba8d952fd8eaee947d7d241bc", @generic="b4aee85209072132274dbef659611945c7a6509e7ea518570fba4fc0ff0eb0802e26e4ba4557b641b863dbb2f66698d335d51a6aee1a97a26f47975044d06a05e4469f81b5bc6da79c69d934b528", @generic="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"]}, 0x1138}, {&(0x7f0000001640)={0x134, 0x2d, 0x4, 0x70bd25, 0x25dfdbff, "", [@typed={0x8, 0x48, @uid=r5}, @generic="ccecd26baad47b0427123607ae83ba774c01accde7f5a4eb3c07d51d8f2b76f7dacb81c37ee8feb9a93e7ed566cd25915bd1fb03b2ed0b83943d18120b8c0ec7540993490f341bbea90c30eaae2f59aa013da3c5dec9717861e23b946660cbfbb8e455bc988b246b75634fa6639dd3eccaad11b7d3b21dbeeaad627034e0ae4c583b9eceee555412d2ae11c41f33761f40e39e54802aa3f801d894ced8b48ce35017e9a5946c4f220b00c8bb0c98da208d6c35288dc422", @nested={0x64, 0x2e, [@typed={0x8, 0x62, @str='\x8e!\x00'}, @typed={0x8, 0x5f, @pid=r1}, @generic="1a2a1810efa4fe045f20072d3a33a5d66f0f6880a0ab51991ec30ff8ba0799696ad2a51ae80eb51e4f72376a50b30a3ef3a6", @typed={0x14, 0x3a, @ipv6=@mcast1}, @typed={0x8, 0x5e, @uid=r6}]}]}, 0x134}, {&(0x7f00000018c0)={0x33c, 0x31, 0x0, 0x70bd28, 0x25dfdbfc, "", [@typed={0xc, 0x29, @u64=0x4053}, @generic="2a3f960cac5836828739fe8dfeb92d1ed8b5ca9aeb35e43e076d179368c705bde6dc10a81ec415c5ba31d85c849b7b", @nested={0xf0, 0x94, [@typed={0x4, 0x41}, @generic="0e7eddb333b4e7a8a337f5758802997c7132f86eb85d14ace435e530d3271ec2c2cf50ed434807630c4716cc8c2ebb8af95df9034f8c3b847ef9f73aa00fe20f56e1459a3435cff8e7ac0e128bed506d9595ef8170cf9226e0107e7a8acd7943aec40bfbc125acb2385663c794255e31c387299fa5754da20e7e3e19f2262aae49d0521f82f2f9f6811b7c33968aab85aa209a71f98c4369e2070a84e2e49ecdd25754b043d2058f40bbd254b3d209d8b894682209df84189a387b60e5d60edb78618044f98bd4f52726050a18cf2a40", @typed={0x8, 0x39, @fd=r0}, @typed={0x10, 0x8d, @str='/dev/amidi#\x00'}, @generic]}, @typed={0x8, 0x11, @uid=r7}, @generic="3c22e425f585d87ea13352950304f47af44002d918847c8f02a3873fd64b99301ca5d02991f55a308d20", @nested={0x50, 0x7c, [@generic="87f96ae0afe62df15ed2981d65f01062490e2346a44e5e78ec4662f04168d2073a7a48b47b14903a87c3e8", @typed={0x8, 0x71, @pid=r1}, @typed={0x10, 0x94, @str='/dev/amidi#\x00'}, @typed={0x8, 0x96, @ipv4=@broadcast}]}, @nested={0x17c, 0x12, [@generic="6a036c499a03e99b8020dc549eb7e5b850f60a81610ce31534a02847f2dd58d56bc0be82e8ecee9df6da21c7ea3c5a8cc3d25bc92d82a88c8e25e4df3ef869ffdd31e98c8373e61f1bd44114baa53016ac528177b56db2693620b8c3255bed6842e9fa70be1e785a7b66a245a82ebe3941573b139d27f3f934550cb18ca99bc76b4eaa67aed625b01715addfabcc868c2e79813ebc06375d315a9c8ebd2414530647b00e982e4fdb3741353f93b7db2e48aeff839a83d93d", @typed={0x8, 0x3e, @uid=r8}, @typed={0x8, 0x2e, @u32=0x7}, @typed={0x8, 0x30, @uid=r9}, @generic="587bea8901c017d2c46ad0b4c368af8932fe0437a21993ea95a993acc9a40b4d7aa8d167d91387ecf493af2af6c1358b1de16782e42f9b254401bd6f46261c00e1b66277d117cf9126caa8180a0aed413a51fdb3db8579f5019b4e6bccbf3f5050b11e4b0dbb1e4fb974bb029d61f22e45bcf22dcd764d5e342cd019744e80e752a164601b97b6c12c74943ae3c06821fd48b048353ba3fd4bb5222d7c0aeb02c1bda6f7e4"]}]}, 0x33c}, {&(0x7f0000001c00)={0x150, 0x19, 0x8, 0x70bd2a, 0x25dfdbff, "", [@generic="86b646b66458f642b2d56d67a7cd8bfe917f16574302677993b2b97da10b2dc27c2ef913cf1475a26a0502532dca1d642f7969b3f395cf4bb1b295dc11619d5a1865fcf24bfff77e9d0351aade9196b74e83a666b028340e79f4fa68b60e011f446727e48266f2d023dc6044b99c87026cbaf5939d329f14322db1fba9fe05ce227045a3dd29f228cefa49f2209de71c2be7", @typed={0x8, 0x59, @ipv4=@multicast2}, @generic="ac3dbe474ede6f14762278a20983a5f7a046bb9fad199f3484599d03f47bbac89a067a7516ba64eb540f4d9704b0a80daa24fd2e8d9e3f424f51597479db2967ff2e313ccba921c31820f737e7213a02ae143e1dac5155ad9009497c4495184856bfea213675fb47bd3bb8628d562bc52bb7ce99546eaa5e8c4b4f636117026e38d9a9f82dec7cf3197c26725d86032e39a744bbea004b2c46cf3ff8c3276880d064143d1197"]}, 0x150}, {&(0x7f0000001d80)={0xf8, 0x1b, 0xa00, 0x70bd2a, 0x25dfdbff, "", [@typed={0xb8, 0x15, @binary="c0c9222e7093a1be913100262f428db82f315bc38208f9cbfbc361186cc3ac806c6ed4cd8b99c9f2ac977919d2a52ca722f8a6aef8ee419568c68ea5b1746060e2c905bd09ce414715d1209f72ae95b3350693c7338493c42a07d7a901885ea4b1dfa9ed127e94be20b08ac40d9ccf455c2f660cf769647e661d63b8fce20cc2459f235f678bc3f626728ab3cc604cd8cba10e214c0ce6dd37c35e0448ecb89884d430748e542cb10e3e7d678f17e9300a2f"}, @generic="863224c939ffb6e922df34d1eac8a93caaa27d4988c5ebdf9e285d2e5a34beffee", @typed={0xc, 0x94, @u64=0x3}]}, 0xf8}], 0x5, &(0x7f0000001f00)=[@rights={{0x28, 0x1, 0x1, [r2, r2, r0, r0, r2, r2]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r2, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r2, r0, r2]}}, @rights={{0x1c, 0x1, 0x1, [r2, r2, r0]}}], 0x88, 0x1}, 0x40) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000002000), &(0x7f0000002040)=0x4) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f0000002080)=0x1, 0x4) recvmmsg(r2, &(0x7f00000038c0)=[{{&(0x7f00000020c0)=@xdp, 0x80, &(0x7f0000003140)=[{&(0x7f0000002140)=""/4096, 0x1000}], 0x1, &(0x7f0000003180)=""/161, 0xa1}, 0x2}, {{&(0x7f0000003240)=@alg, 0x80, &(0x7f00000035c0)=[{&(0x7f00000032c0)=""/90, 0x5a}, {&(0x7f0000003340)}, {&(0x7f0000003380)=""/71, 0x47}, {&(0x7f0000003400)=""/18, 0x12}, {&(0x7f0000003440)=""/108, 0x6c}, {&(0x7f00000034c0)=""/120, 0x78}, {&(0x7f0000003540)=""/103, 0x67}], 0x7}, 0x7f}, {{&(0x7f0000003640)=@caif=@util, 0x80, &(0x7f0000003800)=[{&(0x7f00000036c0)=""/89, 0x59}, {&(0x7f0000003740)=""/28, 0x1c}, {&(0x7f0000003780)=""/100, 0x64}], 0x3, &(0x7f0000003840)=""/112, 0x70}, 0xfffffffffffff11a}], 0x3, 0x40000000, &(0x7f0000003980)={0x77359400}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000001, 0x5050, r2, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x8000) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000003a80)={'broute\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000039c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x0, [{}]}, 0x88) 07:54:15 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = geteuid() stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001840)={0x0, 0x0}, &(0x7f0000001880)=0xc) sendmsg$netlink(r2, &(0x7f0000001fc0)={&(0x7f00000002c0)=@proc={0x10, 0x0, 0x25dfdbfd, 0x8280}, 0xc, &(0x7f0000001e80)=[{&(0x7f0000000300)={0x1138, 0x36, 0x200, 0x70bd2d, 0x25dfdbfe, "", [@generic="1c53e8a6f1cdb5ff7be4dc8ec71bedbe2c2fd721fd7fd272577d6af3e5738d412cc426c7320e7b784c685f5154fbcef783af1db492a9deae1602ec0c72cafb1024ac16b2539205ace26ada3ff602c29c4552b97342c3245845edc8620737524aced48855ce003f76776f1b736b704318ac2fef835751a964caf7ecf6e0a2d0f0668cdefb3e23c549112357ee29f54d788fff9822215006bd1f85404b83862055aab50f495aa07ffb662b8ff65d441c0e777f0d27f278799c685c0cfaf347e2d6a105969e75df2e16bc50bba44a0ba8d952fd8eaee947d7d241bc", @generic="b4aee85209072132274dbef659611945c7a6509e7ea518570fba4fc0ff0eb0802e26e4ba4557b641b863dbb2f66698d335d51a6aee1a97a26f47975044d06a05e4469f81b5bc6da79c69d934b528", @generic="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"]}, 0x1138}, {&(0x7f0000001640)={0x134, 0x2d, 0x4, 0x70bd25, 0x25dfdbff, "", [@typed={0x8, 0x48, @uid=r5}, @generic="ccecd26baad47b0427123607ae83ba774c01accde7f5a4eb3c07d51d8f2b76f7dacb81c37ee8feb9a93e7ed566cd25915bd1fb03b2ed0b83943d18120b8c0ec7540993490f341bbea90c30eaae2f59aa013da3c5dec9717861e23b946660cbfbb8e455bc988b246b75634fa6639dd3eccaad11b7d3b21dbeeaad627034e0ae4c583b9eceee555412d2ae11c41f33761f40e39e54802aa3f801d894ced8b48ce35017e9a5946c4f220b00c8bb0c98da208d6c35288dc422", @nested={0x64, 0x2e, [@typed={0x8, 0x62, @str='\x8e!\x00'}, @typed={0x8, 0x5f, @pid=r1}, @generic="1a2a1810efa4fe045f20072d3a33a5d66f0f6880a0ab51991ec30ff8ba0799696ad2a51ae80eb51e4f72376a50b30a3ef3a6", @typed={0x14, 0x3a, @ipv6=@mcast1}, @typed={0x8, 0x5e, @uid=r6}]}]}, 0x134}, {&(0x7f00000018c0)={0x33c, 0x31, 0x0, 0x70bd28, 0x25dfdbfc, "", [@typed={0xc, 0x29, @u64=0x4053}, @generic="2a3f960cac5836828739fe8dfeb92d1ed8b5ca9aeb35e43e076d179368c705bde6dc10a81ec415c5ba31d85c849b7b", @nested={0xf0, 0x94, [@typed={0x4, 0x41}, @generic="0e7eddb333b4e7a8a337f5758802997c7132f86eb85d14ace435e530d3271ec2c2cf50ed434807630c4716cc8c2ebb8af95df9034f8c3b847ef9f73aa00fe20f56e1459a3435cff8e7ac0e128bed506d9595ef8170cf9226e0107e7a8acd7943aec40bfbc125acb2385663c794255e31c387299fa5754da20e7e3e19f2262aae49d0521f82f2f9f6811b7c33968aab85aa209a71f98c4369e2070a84e2e49ecdd25754b043d2058f40bbd254b3d209d8b894682209df84189a387b60e5d60edb78618044f98bd4f52726050a18cf2a40", @typed={0x8, 0x39, @fd=r0}, @typed={0x10, 0x8d, @str='/dev/amidi#\x00'}, @generic]}, @typed={0x8, 0x11, @uid=r7}, @generic="3c22e425f585d87ea13352950304f47af44002d918847c8f02a3873fd64b99301ca5d02991f55a308d20", @nested={0x50, 0x7c, [@generic="87f96ae0afe62df15ed2981d65f01062490e2346a44e5e78ec4662f04168d2073a7a48b47b14903a87c3e8", @typed={0x8, 0x71, @pid=r1}, @typed={0x10, 0x94, @str='/dev/amidi#\x00'}, @typed={0x8, 0x96, @ipv4=@broadcast}]}, @nested={0x17c, 0x12, [@generic="6a036c499a03e99b8020dc549eb7e5b850f60a81610ce31534a02847f2dd58d56bc0be82e8ecee9df6da21c7ea3c5a8cc3d25bc92d82a88c8e25e4df3ef869ffdd31e98c8373e61f1bd44114baa53016ac528177b56db2693620b8c3255bed6842e9fa70be1e785a7b66a245a82ebe3941573b139d27f3f934550cb18ca99bc76b4eaa67aed625b01715addfabcc868c2e79813ebc06375d315a9c8ebd2414530647b00e982e4fdb3741353f93b7db2e48aeff839a83d93d", @typed={0x8, 0x3e, @uid=r8}, @typed={0x8, 0x2e, @u32=0x7}, @typed={0x8, 0x30, @uid=r9}, @generic="587bea8901c017d2c46ad0b4c368af8932fe0437a21993ea95a993acc9a40b4d7aa8d167d91387ecf493af2af6c1358b1de16782e42f9b254401bd6f46261c00e1b66277d117cf9126caa8180a0aed413a51fdb3db8579f5019b4e6bccbf3f5050b11e4b0dbb1e4fb974bb029d61f22e45bcf22dcd764d5e342cd019744e80e752a164601b97b6c12c74943ae3c06821fd48b048353ba3fd4bb5222d7c0aeb02c1bda6f7e4"]}]}, 0x33c}, {&(0x7f0000001c00)={0x150, 0x19, 0x8, 0x70bd2a, 0x25dfdbff, "", [@generic="86b646b66458f642b2d56d67a7cd8bfe917f16574302677993b2b97da10b2dc27c2ef913cf1475a26a0502532dca1d642f7969b3f395cf4bb1b295dc11619d5a1865fcf24bfff77e9d0351aade9196b74e83a666b028340e79f4fa68b60e011f446727e48266f2d023dc6044b99c87026cbaf5939d329f14322db1fba9fe05ce227045a3dd29f228cefa49f2209de71c2be7", @typed={0x8, 0x59, @ipv4=@multicast2}, @generic="ac3dbe474ede6f14762278a20983a5f7a046bb9fad199f3484599d03f47bbac89a067a7516ba64eb540f4d9704b0a80daa24fd2e8d9e3f424f51597479db2967ff2e313ccba921c31820f737e7213a02ae143e1dac5155ad9009497c4495184856bfea213675fb47bd3bb8628d562bc52bb7ce99546eaa5e8c4b4f636117026e38d9a9f82dec7cf3197c26725d86032e39a744bbea004b2c46cf3ff8c3276880d064143d1197"]}, 0x150}, {&(0x7f0000001d80)={0xf8, 0x1b, 0xa00, 0x70bd2a, 0x25dfdbff, "", [@typed={0xb8, 0x15, @binary="c0c9222e7093a1be913100262f428db82f315bc38208f9cbfbc361186cc3ac806c6ed4cd8b99c9f2ac977919d2a52ca722f8a6aef8ee419568c68ea5b1746060e2c905bd09ce414715d1209f72ae95b3350693c7338493c42a07d7a901885ea4b1dfa9ed127e94be20b08ac40d9ccf455c2f660cf769647e661d63b8fce20cc2459f235f678bc3f626728ab3cc604cd8cba10e214c0ce6dd37c35e0448ecb89884d430748e542cb10e3e7d678f17e9300a2f"}, @generic="863224c939ffb6e922df34d1eac8a93caaa27d4988c5ebdf9e285d2e5a34beffee", @typed={0xc, 0x94, @u64=0x3}]}, 0xf8}], 0x5, &(0x7f0000001f00)=[@rights={{0x28, 0x1, 0x1, [r2, r2, r0, r0, r2, r2]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r2, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r2, r0, r2]}}, @rights={{0x1c, 0x1, 0x1, [r2, r2, r0]}}], 0x88, 0x1}, 0x40) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000002000), &(0x7f0000002040)=0x4) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f0000002080)=0x1, 0x4) sched_yield() 07:54:15 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = geteuid() stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001840)={0x0, 0x0}, &(0x7f0000001880)=0xc) sendmsg$netlink(r2, &(0x7f0000001fc0)={&(0x7f00000002c0)=@proc={0x10, 0x0, 0x25dfdbfd, 0x8280}, 0xc, &(0x7f0000001e80)=[{&(0x7f0000000300)={0x1138, 0x36, 0x200, 0x70bd2d, 0x25dfdbfe, "", [@generic="1c53e8a6f1cdb5ff7be4dc8ec71bedbe2c2fd721fd7fd272577d6af3e5738d412cc426c7320e7b784c685f5154fbcef783af1db492a9deae1602ec0c72cafb1024ac16b2539205ace26ada3ff602c29c4552b97342c3245845edc8620737524aced48855ce003f76776f1b736b704318ac2fef835751a964caf7ecf6e0a2d0f0668cdefb3e23c549112357ee29f54d788fff9822215006bd1f85404b83862055aab50f495aa07ffb662b8ff65d441c0e777f0d27f278799c685c0cfaf347e2d6a105969e75df2e16bc50bba44a0ba8d952fd8eaee947d7d241bc", @generic="b4aee85209072132274dbef659611945c7a6509e7ea518570fba4fc0ff0eb0802e26e4ba4557b641b863dbb2f66698d335d51a6aee1a97a26f47975044d06a05e4469f81b5bc6da79c69d934b528", @generic="fa67e473b0ae6a8a0002a268bde8590c12cfe7b7b6a8220888999d8687a59158d1152b5af49a48b2c1f316df7535d16819cf6f4bc1fb402054cb3b384a14269e129155be5c8eb707c147ebcd4086d2188aa33b2ec0cfc7a675ec584be35dbd926b18e8a3f4e910ace4f208ec8b8bdbea7c96a2ce135890552e4e11c0f2d9d0b87a75cc01dd0bee9ad4814dd0acbc3cbb2e3e6b55254fedba3fe5753c83850c9661181437ad6146de80e1cbca315c4cb2b8d1568989c329534d13eba4a93f87f604a75ad0a79e67fe52d717609f3eb38d33f5c0a2c043eb55910f48d9f18a8acbfbec77a9c02ecc364f9ac1a6763906603267418d5ac11d5dee9b1a0ac935252328485daba424619942b6f3d0b4e14379afbaec4a77aaf9606efc5ed10582996024256d7c85585e147dfa70c76cc91c7032ed691400e568feb13dd7f36d3d50bf2646ff466cbe7a1292ac48a52c3087b3e03f557b868e9d327f0daf4a1e9581a10f0d5258e35379a5548cee44585627b8a28fc4ff55487c1658c65ce32c828d9e86c2e95b42551bb4ae733bda23f910220248495456ab0b2d114bf06844182c7fd3db6d5bd97ca1961e09dd62336428dd86c7a4f333eb840b27910523b95b529a2a48d1eeabab1430116d982bf02cc5a74caf5c6a1a023ee6f9b903a656fc83cf9cab74cdc9b2bb64f2f96b54d3e5d16da19cf10d47360efa4c0bea7d4bc045ae398565cf3c4308f4302f58fe1e18e9d40b7b5265ccd74baf57391054eaf9a8e9ca4d399162cebab4b02ffb6c8285b0c044df6ac432c711c1ef30f1d65f3ffef28b9ddc83aca255b0960182a75d7221965ea8fbbbb3135be4ebc76171349f85811bc4b2062af0199d3422766d3377a29470f7c50900055b023ff21275eaeaaef9cecee9b89a9efb3d096fa6d218feeaa76ef60daa5782756f80e9ac86ee499823b45707a6e30eb3cd74fc1831ef1630b7230f0a2e2ba02316827755c0bff0f693f56f6b99dd449768fd307e91ae9545cf31cd17e4463c00437f232e8b04c0e53f1d19b03a75089d1367478aaf6292b8b10d0700991db76cfa496835efdae07c3385b6d49e6e8e148edc18d61cd99773fd80900eef93659756081cd3013ea50fee7b664bfa0434d59e876f9aaf939d87dcde8aeff9d44d234bc3f808edf70c51acacbb882af3fefd605cb1d6671066a0315acc2a3645c900434bb00c4cdc839649debc53a0e015ac9e9adf9816527719343c070e29b12451889993f47bf0cdd7c6b9de734b615f1ad8fdafb97e3f075ae1e737e2ea9e029cac7be162130f68bd11ed6d3c7a69d294081bc88fd8b675fc78620ad38d35804032db244737c671b740c47667ed81a44678a270bbae17e7a89822ba6fc0e2595af02f5a13ab133b33cc911a295a3a62f1aeb6bafd518515e3e887666e07e68136ae5e58afcec88f128c8d7b62da16bf4d8b0426cb695402bd03fb2aaa078af39a3c20e23c8f772c319e46517eba9aa896a9c4a147c32e034c5b9dd8d065fc421bcf588a15f1ab166c23875358b9ac8fb116452f4ddcd2c879f2489ec9d06002f94a6c472e22285514dab6bf9c66794ebe3172a4af2a65c657a1c5312220782cc404d8aa33820ffb61e382769870f76bd901b795007601a08e1ca624a3a61272200a08ee8519be3ef9e57ec3bb8f8cf3b332aefd88bf8630fe1cb9e929f08dc5b680cf7d3ac4783cf7183d1411fd7d4e1e755551927aae680528378a7f68f2dca7856ab4e6a698c5e176660c73095edd97645fd52d2ba9fde3a2c29fc480dcafd171986241eb9b1e3898408f0c5115994eabab77899fe5f846369b97a98e7a39d5d00259e78b594a95b37266c4874b225c986d9e73ea24bdfb636b5e36c5f79aeb15ccf32c4c8413426a754e12456e99558216e23a788464c87a2a87ed7671188afb7e7b1f27bc4ffcffa91c3d375e7590d663426408ba9b53956ac5ae30cc10a4c64d46a5edd074b4d308102b26544eca4b73735ac72097d7406d726f6cbe1bb79df9c083f782524c3bd72f4e96a410d37dbbdf56967f5f6f53b2a9f900598d37ffe3bb4a65431c7addd80c8909063a63515f67938d3c9170331f4b3dc322ced7b80949cc8248862fbf06abd5e0c70cb4a435243325adf2a6c8ad49f6110cfb8a1245c2e93c93660ed00fff192d5371b8ed3a283bf76097979ba3131c41d256cc29d0f3ae4f109d380bac03852a32c1b17741be07fe7201e3b86de126a6e0a5138bf280498626588a8c7d95b87027e849a1d0c944b26167fbcad0e355f9c7a548b4dbc6b1020897f055f58d610335bfa48e2249e473297a52f7295324c82af8b2b0b89fd2db34eb399ae7e97f48d863b96967940ad3f11dd052abd8762768701d22d6896405dd8cba5e94c52b1bfc7031fccc479c55c0fc4595d9a1ffaf989e5a3fc4ea017eeb943926134f10734e18bea9a393e6af2c9abe3f0efa2d0235ca3e3cfc93eaa3889d74f2a9b7bb352efbd08e4e09c0ce22d6a2d5e3a951e753e816bd92ba3df263a7d8258c68d98305bf2e3910ce82706d9282c7b938f0a7f209f2886a75edb33357afd4afb4119a90f0cc217b626e5db816c570952b6b7707d9461c2c2764a0c454784ac5e0eb8583780a73611facf38409fb4c2c41169520f95ae20411b5dfd19a003c5add356b921550f42b646597fa4fcd8ced9f1bdc3d0a8fa6e80ad43dbebf2dc55dedda6fea87911f4f2b8af7992f4ea5f81dae76e3c379865c94e18ee7348745a0be1ee4c1bef334051002e86aa507e5e6813b9d34876baf77ec6e58a5bcfbeeb216d85e252974be8228f2bb1a3e29a4ebc17fdc84f3de0bf04881b624e06ec7503a2182500016b2af565b0a3a60dee26419247a50e698ca4fd10042206f117a043240f6f72765d29ce851bd51d3fa8bce856932113cbe11f45a33c58de7705bd44342f6e1565a52f0fe022944a48bcf1fed77336968a9d56b47e4b6e3e7d6cc1b6a0b3384bb7e7b40604d11936b1c2693bcf2f7810d8b50354b5c3f5992da0a4c456f6907d8e7940b3f0916776835a34f761f08c25f3f21e8dab47635335a798f72ca4e9def82d065f009473fa1779ba68493bb15fd1383a099b1b04f23bccc3ab18dd65f2d654950a14743f6e3fe5829f6b8e58a0a73cefbb7130a7f5bfbfc724885715cd8158ef85c6098d2f7b42542d6de0357d7da2d5d540427a754d8118d6b0a573f3d5d46a0fb1c72d4f4331a9fc66189f26e23ec3b145c3897f5be72a8903421ea81e26511eb27c03f6605eb1b03e1d99452672abc9e673c518bf90ddadef9b84acfe661a4db0a5f604b277f56014578c1209356e6daa18bc7b9973487db22a62f39f7f7de2b16078d86bcb9756c525f1c9b7911367e53b0b86b90a88f6d3ff8b6af479b1eb7bbc9d2dc5a93433ced6272f9605209f8f33d6e273de5586111b0f98e80ba8356386c8dfba3f0a4fbead128e40caff8c990ce9bb8eb3c7c920a17341f7174a34c8c35ba4a70e80e5047aed0b90f6a5b058118ddf71f59355f624afbdbfe9e32614f0e594ce7e89c8e25c37beb7ffe99cd991e5800bc12121c45c98ae8f72958e74b9d56f6f9d12f3ce1ed1bb8c4b9db828a04a65b3ad4d9beab2348e5a228fd3dfdc6de9edba5f4e42d69a856315a528043cc7d3b54b702f46207020910e953ae5a817b7b2fe4cf59bb7dab29dbd7aa25912e40ce1278b977849578d7d242ac41e5dceba59cfc4eac55738cc70446c8df6e37779e01c0ebb6624a86816d16f9873ba483b3f75f2ef89f513475c03bf6527d48b142372fd68633ceb9cd4b51500c2138e2f9f75dd3d0947b18a264ec02680d1b5363c7be5bb02e6e8da6604c0f45db2439b8de7ff96e898c25bf6fa6c0008ce6c89455bc2e7db94e86b74e1aa9641bf881139b6fcf556724aa3bfce679e7d78441b4c6765b66dcc3b2febce4eea314d9c0d09b6396a6d85bc79d6c98c30a979bc113c33382bc12411a8102145b22c581e7a5b364ca91a4352dbbb39de010487c21d99b4eee79558942bee42ab6b21916c33160968ee0f8b9dfdc366e3d58d502d5538cbd4fd9b1fbba086f7bd2c698652374e8b23f1b0176039bc40e5709797cd2aa18448c83ce40f56f2d1531efa0ad9d7c8a1cc4cd8ff79dedac29b461c48d307dc1d13e27b0ea201bd6651601b2dd94d9c28e311cfef4ef4c24312cf297e9f1792e7e39f677c3b50f9a4317186f9aa20f1c3d2bad0f4a0a06b796cb62f69390ca606eec3966403b6c5b8e5e7bc95ec2232799f91be02c48e70a58139ca28920bef8f3d0e10560b32af57f3db153647fe5a46a72453705a7beadb4ae7f71af91ac0d17f5a1be0c7a381210e4504052e631fbd184c96ae3fb2aeb5d19dc3aa27807fee9c32cdc9f102b5ae6fe2f1fa2c908c237dc133dd175c1bd7ef750d17116804372b3d4aa82a1d6068f5589f62cf9cf25bbf931c6cdb47fc24afd5ccb3ec15d48c170ea3e495ba6c4c24c54cf581bad4f0d28baec769626c97f9675bb1de9f2348c1126d49100aed700d80fe33f095f61902bfaa45c13fbf2818ba82ff2aba7517b05b5b176ccc18fd17311cf828f8d757c2a8e69038bb9556222864fe639a3d008f38df896cc771cb11e0607794787298f678c8a9bb5fca851e0dbc47ba1fa53fe1f2ce999fa94385a6435d48483171bcbc4655c1d021717f8e74bcda6c746a4ff1aa0b3c4ab080bbdfa89a3aa67702b06867f2de3cceadfd210703609e63bee294f3e18f19b494595c235d5bcb51376ce3e2a5086da0c12d3cdd6b460578f7f1d9eb9d6f0cf32a6ac210c2a9241b1e4da198c2f72200e6ec999ed24b73fbc03a7780b73e14eb7931d6dc2ddb2e475c2125315206b050f44a5d295d0f032b7fb3d877e442e357b518031af8b7f4f4988c26c09e0b46e371c1558ae11b993961db16addf55f658377c448230e526694599096062cb51290d0e6daec8ea12ca7d202fff8cf5e73b8ce8652c234ed63c3c094d68285958479a1d113e39438f7095968b61776aab68c62be5392b958546388841a1d21d9e51ec5654dfb1ec6fdb19655c23b29112d9c5a2f1157e66fb6e484cfad2aebbecb639fd620f01d3374c8df183fedbf695027793d4edacff92c0ed5e7442f6a60d9a5a1583265bff67aae0747af448b04b1d08c5085213b3345fcfaf263d5be7eaf7de7542b92bcbc3e4fc9da7cd799aaaa331e5319da3f0be83b8d8771e3ef6e0c3a14adfaa76555bae25e853f2fb531975ff543d4f2379af9f4efd751c44fbaf0f3f949d00321a10093bc3c97178c818a74c7719e4edb0a88b85116e231aaaade27ce75201362cfb0af56ca7bd550875cd6521c3aaa45a94e7cb4fabcec6f65853c3764fb0ee01ddf984fd1baab1486445b797ae0f6229d98589984625b7489a6a90ded67828565ffa6df8e3acc94ed9b74f039761c7ead54732ec1e32b3fb4ca82ff7db5613e1f1386ed785da6c0b835e715bddd286a64bb9e5846a4c9887565f8795919125570f37f0cf4142ec964f412ff058d07e9430d967acbac0c628e1bc8c9749b53c8037ae9fc1493179a6a86ba3be1decf3d242c6a554f59a9bb659489062ec350e32546d664dcc58ad58ab752cfd7e3cf641b6931b19db090b5903eaa33c31988528f2a79128d9127b41fec979f1b55fa956353e46ed5c9c689ad8ff93e605fc3061ac68b60ca225513f96172453b38fec6474472c1a9df9c415596a07b25b10b9b77604aba3b78011ba5e0d7bd6914868d3066685bbcdb9a5f82bd6070d228f1afb633b50a04"]}, 0x1138}, {&(0x7f0000001640)={0x134, 0x2d, 0x4, 0x70bd25, 0x25dfdbff, "", [@typed={0x8, 0x48, @uid=r5}, @generic="ccecd26baad47b0427123607ae83ba774c01accde7f5a4eb3c07d51d8f2b76f7dacb81c37ee8feb9a93e7ed566cd25915bd1fb03b2ed0b83943d18120b8c0ec7540993490f341bbea90c30eaae2f59aa013da3c5dec9717861e23b946660cbfbb8e455bc988b246b75634fa6639dd3eccaad11b7d3b21dbeeaad627034e0ae4c583b9eceee555412d2ae11c41f33761f40e39e54802aa3f801d894ced8b48ce35017e9a5946c4f220b00c8bb0c98da208d6c35288dc422", @nested={0x64, 0x2e, [@typed={0x8, 0x62, @str='\x8e!\x00'}, @typed={0x8, 0x5f, @pid=r1}, @generic="1a2a1810efa4fe045f20072d3a33a5d66f0f6880a0ab51991ec30ff8ba0799696ad2a51ae80eb51e4f72376a50b30a3ef3a6", @typed={0x14, 0x3a, @ipv6=@mcast1}, @typed={0x8, 0x5e, @uid=r6}]}]}, 0x134}, {&(0x7f00000018c0)={0x33c, 0x31, 0x0, 0x70bd28, 0x25dfdbfc, "", [@typed={0xc, 0x29, @u64=0x4053}, @generic="2a3f960cac5836828739fe8dfeb92d1ed8b5ca9aeb35e43e076d179368c705bde6dc10a81ec415c5ba31d85c849b7b", @nested={0xf0, 0x94, [@typed={0x4, 0x41}, @generic="0e7eddb333b4e7a8a337f5758802997c7132f86eb85d14ace435e530d3271ec2c2cf50ed434807630c4716cc8c2ebb8af95df9034f8c3b847ef9f73aa00fe20f56e1459a3435cff8e7ac0e128bed506d9595ef8170cf9226e0107e7a8acd7943aec40bfbc125acb2385663c794255e31c387299fa5754da20e7e3e19f2262aae49d0521f82f2f9f6811b7c33968aab85aa209a71f98c4369e2070a84e2e49ecdd25754b043d2058f40bbd254b3d209d8b894682209df84189a387b60e5d60edb78618044f98bd4f52726050a18cf2a40", @typed={0x8, 0x39, @fd=r0}, @typed={0x10, 0x8d, @str='/dev/amidi#\x00'}, @generic]}, @typed={0x8, 0x11, @uid=r7}, @generic="3c22e425f585d87ea13352950304f47af44002d918847c8f02a3873fd64b99301ca5d02991f55a308d20", @nested={0x50, 0x7c, [@generic="87f96ae0afe62df15ed2981d65f01062490e2346a44e5e78ec4662f04168d2073a7a48b47b14903a87c3e8", @typed={0x8, 0x71, @pid=r1}, @typed={0x10, 0x94, @str='/dev/amidi#\x00'}, @typed={0x8, 0x96, @ipv4=@broadcast}]}, @nested={0x17c, 0x12, [@generic="6a036c499a03e99b8020dc549eb7e5b850f60a81610ce31534a02847f2dd58d56bc0be82e8ecee9df6da21c7ea3c5a8cc3d25bc92d82a88c8e25e4df3ef869ffdd31e98c8373e61f1bd44114baa53016ac528177b56db2693620b8c3255bed6842e9fa70be1e785a7b66a245a82ebe3941573b139d27f3f934550cb18ca99bc76b4eaa67aed625b01715addfabcc868c2e79813ebc06375d315a9c8ebd2414530647b00e982e4fdb3741353f93b7db2e48aeff839a83d93d", @typed={0x8, 0x3e, @uid=r8}, @typed={0x8, 0x2e, @u32=0x7}, @typed={0x8, 0x30, @uid=r9}, @generic="587bea8901c017d2c46ad0b4c368af8932fe0437a21993ea95a993acc9a40b4d7aa8d167d91387ecf493af2af6c1358b1de16782e42f9b254401bd6f46261c00e1b66277d117cf9126caa8180a0aed413a51fdb3db8579f5019b4e6bccbf3f5050b11e4b0dbb1e4fb974bb029d61f22e45bcf22dcd764d5e342cd019744e80e752a164601b97b6c12c74943ae3c06821fd48b048353ba3fd4bb5222d7c0aeb02c1bda6f7e4"]}]}, 0x33c}, {&(0x7f0000001c00)={0x150, 0x19, 0x8, 0x70bd2a, 0x25dfdbff, "", [@generic="86b646b66458f642b2d56d67a7cd8bfe917f16574302677993b2b97da10b2dc27c2ef913cf1475a26a0502532dca1d642f7969b3f395cf4bb1b295dc11619d5a1865fcf24bfff77e9d0351aade9196b74e83a666b028340e79f4fa68b60e011f446727e48266f2d023dc6044b99c87026cbaf5939d329f14322db1fba9fe05ce227045a3dd29f228cefa49f2209de71c2be7", @typed={0x8, 0x59, @ipv4=@multicast2}, @generic="ac3dbe474ede6f14762278a20983a5f7a046bb9fad199f3484599d03f47bbac89a067a7516ba64eb540f4d9704b0a80daa24fd2e8d9e3f424f51597479db2967ff2e313ccba921c31820f737e7213a02ae143e1dac5155ad9009497c4495184856bfea213675fb47bd3bb8628d562bc52bb7ce99546eaa5e8c4b4f636117026e38d9a9f82dec7cf3197c26725d86032e39a744bbea004b2c46cf3ff8c3276880d064143d1197"]}, 0x150}, {&(0x7f0000001d80)={0xf8, 0x1b, 0xa00, 0x70bd2a, 0x25dfdbff, "", [@typed={0xb8, 0x15, @binary="c0c9222e7093a1be913100262f428db82f315bc38208f9cbfbc361186cc3ac806c6ed4cd8b99c9f2ac977919d2a52ca722f8a6aef8ee419568c68ea5b1746060e2c905bd09ce414715d1209f72ae95b3350693c7338493c42a07d7a901885ea4b1dfa9ed127e94be20b08ac40d9ccf455c2f660cf769647e661d63b8fce20cc2459f235f678bc3f626728ab3cc604cd8cba10e214c0ce6dd37c35e0448ecb89884d430748e542cb10e3e7d678f17e9300a2f"}, @generic="863224c939ffb6e922df34d1eac8a93caaa27d4988c5ebdf9e285d2e5a34beffee", @typed={0xc, 0x94, @u64=0x3}]}, 0xf8}], 0x5, &(0x7f0000001f00)=[@rights={{0x28, 0x1, 0x1, [r2, r2, r0, r0, r2, r2]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r2, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r2, r0, r2]}}, @rights={{0x1c, 0x1, 0x1, [r2, r2, r0]}}], 0x88, 0x1}, 0x40) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000002000), &(0x7f0000002040)=0x4) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f0000002080)=0x1, 0x4) kcmp(r1, r1, 0x7, r0, 0xffffffffffffff9c) 07:54:15 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r1, 0x5d07, 0x5}, 0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000540), &(0x7f0000000580)=0x14) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) io_uring_register$IORING_UNREGISTER_FILES(r3, 0x3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000600)={r1, @in={{0x2, 0x4e22, @loopback}}}, 0x84) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f00000006c0)=0x1) socket$unix(0x1, 0x5, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x113, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000780)={0x4, 0x8, 0xfa00, {r4}}, 0x10) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000007c0)=@int=0x5, 0x4) ioctl$CAPI_INSTALLED(r0, 0x80024322) 07:54:15 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000080)={0x3e, &(0x7f0000000040)=""/62}) pread64(r0, &(0x7f00000000c0)=""/4096, 0x1000, 0x0) sendto$rxrpc(r0, &(0x7f00000010c0)="01e8dce1faf9e2880d42a5f69f436a8dd04a628a167af0140aee65d16dfdfe8d2d0b8a6a5cc139941dc22ad75a0fb526e31910c09e503a9bbc8dec9ac1f36d1afed38e53750c4421ef50e86611498bcd0fa984630d365e127f5c3a65e7a6cbd0c30e2970d7bae8fbf07d9dd474fa9abe13fa19481d011779ecbce45fd8f57a12844bbcc3275fe7ba65ef5e8cfab8998003ff2813a604b889f9e951f78a8d769869f08ffe816ae6d0eb412bdf93133364bc849925f4ebc4f4bbe3650175962f49104915f017b1d387954ef6ee69b2fdd4cc67058f0e2840eb48bae782e3a94b8677b0bd318cdb2830", 0xe8, 0x4000000, 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f00000011c0)={0x3, 0x3}) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f0000001200)=""/130) getresuid(&(0x7f00000012c0), &(0x7f0000001300)=0x0, &(0x7f0000001340)) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000001380)={0x3, @null, r2}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000008, 0x1010, r1, 0x0) io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x3c4}) io_setup(0x1ff, &(0x7f0000001440)=0x0) io_getevents(r3, 0x4d, 0x6, &(0x7f0000001480)=[{}, {}, {}, {}, {}, {}], &(0x7f0000001540)) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000001580)={{0x2, 0x4e21, @rand_addr=0x80000000}, {}, 0x2, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'rose0\x00'}) io_getevents(r3, 0x80000000, 0x1, &(0x7f0000001600)=[{}], &(0x7f0000001640)={0x77359400}) 07:54:15 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = geteuid() stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001840)={0x0, 0x0}, &(0x7f0000001880)=0xc) sendmsg$netlink(r2, &(0x7f0000001fc0)={&(0x7f00000002c0)=@proc={0x10, 0x0, 0x25dfdbfd, 0x8280}, 0xc, &(0x7f0000001e80)=[{&(0x7f0000000300)={0x1138, 0x36, 0x200, 0x70bd2d, 0x25dfdbfe, "", [@generic="1c53e8a6f1cdb5ff7be4dc8ec71bedbe2c2fd721fd7fd272577d6af3e5738d412cc426c7320e7b784c685f5154fbcef783af1db492a9deae1602ec0c72cafb1024ac16b2539205ace26ada3ff602c29c4552b97342c3245845edc8620737524aced48855ce003f76776f1b736b704318ac2fef835751a964caf7ecf6e0a2d0f0668cdefb3e23c549112357ee29f54d788fff9822215006bd1f85404b83862055aab50f495aa07ffb662b8ff65d441c0e777f0d27f278799c685c0cfaf347e2d6a105969e75df2e16bc50bba44a0ba8d952fd8eaee947d7d241bc", @generic="b4aee85209072132274dbef659611945c7a6509e7ea518570fba4fc0ff0eb0802e26e4ba4557b641b863dbb2f66698d335d51a6aee1a97a26f47975044d06a05e4469f81b5bc6da79c69d934b528", @generic="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"]}, 0x1138}, {&(0x7f0000001640)={0x134, 0x2d, 0x4, 0x70bd25, 0x25dfdbff, "", [@typed={0x8, 0x48, @uid=r5}, @generic="ccecd26baad47b0427123607ae83ba774c01accde7f5a4eb3c07d51d8f2b76f7dacb81c37ee8feb9a93e7ed566cd25915bd1fb03b2ed0b83943d18120b8c0ec7540993490f341bbea90c30eaae2f59aa013da3c5dec9717861e23b946660cbfbb8e455bc988b246b75634fa6639dd3eccaad11b7d3b21dbeeaad627034e0ae4c583b9eceee555412d2ae11c41f33761f40e39e54802aa3f801d894ced8b48ce35017e9a5946c4f220b00c8bb0c98da208d6c35288dc422", @nested={0x64, 0x2e, [@typed={0x8, 0x62, @str='\x8e!\x00'}, @typed={0x8, 0x5f, @pid=r1}, @generic="1a2a1810efa4fe045f20072d3a33a5d66f0f6880a0ab51991ec30ff8ba0799696ad2a51ae80eb51e4f72376a50b30a3ef3a6", @typed={0x14, 0x3a, @ipv6=@mcast1}, @typed={0x8, 0x5e, @uid=r6}]}]}, 0x134}, {&(0x7f00000018c0)={0x33c, 0x31, 0x0, 0x70bd28, 0x25dfdbfc, "", [@typed={0xc, 0x29, @u64=0x4053}, @generic="2a3f960cac5836828739fe8dfeb92d1ed8b5ca9aeb35e43e076d179368c705bde6dc10a81ec415c5ba31d85c849b7b", @nested={0xf0, 0x94, [@typed={0x4, 0x41}, @generic="0e7eddb333b4e7a8a337f5758802997c7132f86eb85d14ace435e530d3271ec2c2cf50ed434807630c4716cc8c2ebb8af95df9034f8c3b847ef9f73aa00fe20f56e1459a3435cff8e7ac0e128bed506d9595ef8170cf9226e0107e7a8acd7943aec40bfbc125acb2385663c794255e31c387299fa5754da20e7e3e19f2262aae49d0521f82f2f9f6811b7c33968aab85aa209a71f98c4369e2070a84e2e49ecdd25754b043d2058f40bbd254b3d209d8b894682209df84189a387b60e5d60edb78618044f98bd4f52726050a18cf2a40", @typed={0x8, 0x39, @fd=r0}, @typed={0x10, 0x8d, @str='/dev/amidi#\x00'}, @generic]}, @typed={0x8, 0x11, @uid=r7}, @generic="3c22e425f585d87ea13352950304f47af44002d918847c8f02a3873fd64b99301ca5d02991f55a308d20", @nested={0x50, 0x7c, [@generic="87f96ae0afe62df15ed2981d65f01062490e2346a44e5e78ec4662f04168d2073a7a48b47b14903a87c3e8", @typed={0x8, 0x71, @pid=r1}, @typed={0x10, 0x94, @str='/dev/amidi#\x00'}, @typed={0x8, 0x96, @ipv4=@broadcast}]}, @nested={0x17c, 0x12, [@generic="6a036c499a03e99b8020dc549eb7e5b850f60a81610ce31534a02847f2dd58d56bc0be82e8ecee9df6da21c7ea3c5a8cc3d25bc92d82a88c8e25e4df3ef869ffdd31e98c8373e61f1bd44114baa53016ac528177b56db2693620b8c3255bed6842e9fa70be1e785a7b66a245a82ebe3941573b139d27f3f934550cb18ca99bc76b4eaa67aed625b01715addfabcc868c2e79813ebc06375d315a9c8ebd2414530647b00e982e4fdb3741353f93b7db2e48aeff839a83d93d", @typed={0x8, 0x3e, @uid=r8}, @typed={0x8, 0x2e, @u32=0x7}, @typed={0x8, 0x30, @uid=r9}, @generic="587bea8901c017d2c46ad0b4c368af8932fe0437a21993ea95a993acc9a40b4d7aa8d167d91387ecf493af2af6c1358b1de16782e42f9b254401bd6f46261c00e1b66277d117cf9126caa8180a0aed413a51fdb3db8579f5019b4e6bccbf3f5050b11e4b0dbb1e4fb974bb029d61f22e45bcf22dcd764d5e342cd019744e80e752a164601b97b6c12c74943ae3c06821fd48b048353ba3fd4bb5222d7c0aeb02c1bda6f7e4"]}]}, 0x33c}, {&(0x7f0000001c00)={0x150, 0x19, 0x8, 0x70bd2a, 0x25dfdbff, "", [@generic="86b646b66458f642b2d56d67a7cd8bfe917f16574302677993b2b97da10b2dc27c2ef913cf1475a26a0502532dca1d642f7969b3f395cf4bb1b295dc11619d5a1865fcf24bfff77e9d0351aade9196b74e83a666b028340e79f4fa68b60e011f446727e48266f2d023dc6044b99c87026cbaf5939d329f14322db1fba9fe05ce227045a3dd29f228cefa49f2209de71c2be7", @typed={0x8, 0x59, @ipv4=@multicast2}, @generic="ac3dbe474ede6f14762278a20983a5f7a046bb9fad199f3484599d03f47bbac89a067a7516ba64eb540f4d9704b0a80daa24fd2e8d9e3f424f51597479db2967ff2e313ccba921c31820f737e7213a02ae143e1dac5155ad9009497c4495184856bfea213675fb47bd3bb8628d562bc52bb7ce99546eaa5e8c4b4f636117026e38d9a9f82dec7cf3197c26725d86032e39a744bbea004b2c46cf3ff8c3276880d064143d1197"]}, 0x150}, {&(0x7f0000001d80)={0xf8, 0x1b, 0xa00, 0x70bd2a, 0x25dfdbff, "", [@typed={0xb8, 0x15, @binary="c0c9222e7093a1be913100262f428db82f315bc38208f9cbfbc361186cc3ac806c6ed4cd8b99c9f2ac977919d2a52ca722f8a6aef8ee419568c68ea5b1746060e2c905bd09ce414715d1209f72ae95b3350693c7338493c42a07d7a901885ea4b1dfa9ed127e94be20b08ac40d9ccf455c2f660cf769647e661d63b8fce20cc2459f235f678bc3f626728ab3cc604cd8cba10e214c0ce6dd37c35e0448ecb89884d430748e542cb10e3e7d678f17e9300a2f"}, @generic="863224c939ffb6e922df34d1eac8a93caaa27d4988c5ebdf9e285d2e5a34beffee", @typed={0xc, 0x94, @u64=0x3}]}, 0xf8}], 0x5, &(0x7f0000001f00)=[@rights={{0x28, 0x1, 0x1, [r2, r2, r0, r0, r2, r2]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r2, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r2, r0, r2]}}, @rights={{0x1c, 0x1, 0x1, [r2, r2, r0]}}], 0x88, 0x1}, 0x40) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000002000), &(0x7f0000002040)=0x4) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f0000002080)=0x1, 0x4) recvmmsg(r2, &(0x7f00000038c0)=[{{&(0x7f00000020c0)=@xdp, 0x80, &(0x7f0000003140)=[{&(0x7f0000002140)=""/4096, 0x1000}], 0x1, &(0x7f0000003180)=""/161, 0xa1}, 0x2}, {{&(0x7f0000003240)=@alg, 0x80, &(0x7f00000035c0)=[{&(0x7f00000032c0)=""/90, 0x5a}, {&(0x7f0000003340)}, {&(0x7f0000003380)=""/71, 0x47}, {&(0x7f0000003400)=""/18, 0x12}, {&(0x7f0000003440)=""/108, 0x6c}, {&(0x7f00000034c0)=""/120, 0x78}, {&(0x7f0000003540)=""/103, 0x67}], 0x7}, 0x7f}, {{&(0x7f0000003640)=@caif=@util, 0x80, &(0x7f0000003800)=[{&(0x7f00000036c0)=""/89, 0x59}, {&(0x7f0000003740)=""/28, 0x1c}, {&(0x7f0000003780)=""/100, 0x64}], 0x3, &(0x7f0000003840)=""/112, 0x70}, 0xfffffffffffff11a}], 0x3, 0x40000000, &(0x7f0000003980)={0x77359400}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000001, 0x5050, r2, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x8000) 07:54:15 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r1, 0x5d07, 0x5}, 0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000540), &(0x7f0000000580)=0x14) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) io_uring_register$IORING_UNREGISTER_FILES(r3, 0x3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000600)={r1, @in={{0x2, 0x4e22, @loopback}}}, 0x84) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f00000006c0)=0x1) socket$unix(0x1, 0x5, 0x0) write$P9_RGETLOCK(r3, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:15 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = geteuid() stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001840)={0x0, 0x0}, &(0x7f0000001880)=0xc) sendmsg$netlink(r2, &(0x7f0000001fc0)={&(0x7f00000002c0)=@proc={0x10, 0x0, 0x25dfdbfd, 0x8280}, 0xc, &(0x7f0000001e80)=[{&(0x7f0000000300)={0x1138, 0x36, 0x200, 0x70bd2d, 0x25dfdbfe, "", [@generic="1c53e8a6f1cdb5ff7be4dc8ec71bedbe2c2fd721fd7fd272577d6af3e5738d412cc426c7320e7b784c685f5154fbcef783af1db492a9deae1602ec0c72cafb1024ac16b2539205ace26ada3ff602c29c4552b97342c3245845edc8620737524aced48855ce003f76776f1b736b704318ac2fef835751a964caf7ecf6e0a2d0f0668cdefb3e23c549112357ee29f54d788fff9822215006bd1f85404b83862055aab50f495aa07ffb662b8ff65d441c0e777f0d27f278799c685c0cfaf347e2d6a105969e75df2e16bc50bba44a0ba8d952fd8eaee947d7d241bc", @generic="b4aee85209072132274dbef659611945c7a6509e7ea518570fba4fc0ff0eb0802e26e4ba4557b641b863dbb2f66698d335d51a6aee1a97a26f47975044d06a05e4469f81b5bc6da79c69d934b528", @generic="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"]}, 0x1138}, {&(0x7f0000001640)={0x134, 0x2d, 0x4, 0x70bd25, 0x25dfdbff, "", [@typed={0x8, 0x48, @uid=r5}, @generic="ccecd26baad47b0427123607ae83ba774c01accde7f5a4eb3c07d51d8f2b76f7dacb81c37ee8feb9a93e7ed566cd25915bd1fb03b2ed0b83943d18120b8c0ec7540993490f341bbea90c30eaae2f59aa013da3c5dec9717861e23b946660cbfbb8e455bc988b246b75634fa6639dd3eccaad11b7d3b21dbeeaad627034e0ae4c583b9eceee555412d2ae11c41f33761f40e39e54802aa3f801d894ced8b48ce35017e9a5946c4f220b00c8bb0c98da208d6c35288dc422", @nested={0x64, 0x2e, [@typed={0x8, 0x62, @str='\x8e!\x00'}, @typed={0x8, 0x5f, @pid=r1}, @generic="1a2a1810efa4fe045f20072d3a33a5d66f0f6880a0ab51991ec30ff8ba0799696ad2a51ae80eb51e4f72376a50b30a3ef3a6", @typed={0x14, 0x3a, @ipv6=@mcast1}, @typed={0x8, 0x5e, @uid=r6}]}]}, 0x134}, {&(0x7f00000018c0)={0x33c, 0x31, 0x0, 0x70bd28, 0x25dfdbfc, "", [@typed={0xc, 0x29, @u64=0x4053}, @generic="2a3f960cac5836828739fe8dfeb92d1ed8b5ca9aeb35e43e076d179368c705bde6dc10a81ec415c5ba31d85c849b7b", @nested={0xf0, 0x94, [@typed={0x4, 0x41}, @generic="0e7eddb333b4e7a8a337f5758802997c7132f86eb85d14ace435e530d3271ec2c2cf50ed434807630c4716cc8c2ebb8af95df9034f8c3b847ef9f73aa00fe20f56e1459a3435cff8e7ac0e128bed506d9595ef8170cf9226e0107e7a8acd7943aec40bfbc125acb2385663c794255e31c387299fa5754da20e7e3e19f2262aae49d0521f82f2f9f6811b7c33968aab85aa209a71f98c4369e2070a84e2e49ecdd25754b043d2058f40bbd254b3d209d8b894682209df84189a387b60e5d60edb78618044f98bd4f52726050a18cf2a40", @typed={0x8, 0x39, @fd=r0}, @typed={0x10, 0x8d, @str='/dev/amidi#\x00'}, @generic]}, @typed={0x8, 0x11, @uid=r7}, @generic="3c22e425f585d87ea13352950304f47af44002d918847c8f02a3873fd64b99301ca5d02991f55a308d20", @nested={0x50, 0x7c, [@generic="87f96ae0afe62df15ed2981d65f01062490e2346a44e5e78ec4662f04168d2073a7a48b47b14903a87c3e8", @typed={0x8, 0x71, @pid=r1}, @typed={0x10, 0x94, @str='/dev/amidi#\x00'}, @typed={0x8, 0x96, @ipv4=@broadcast}]}, @nested={0x17c, 0x12, [@generic="6a036c499a03e99b8020dc549eb7e5b850f60a81610ce31534a02847f2dd58d56bc0be82e8ecee9df6da21c7ea3c5a8cc3d25bc92d82a88c8e25e4df3ef869ffdd31e98c8373e61f1bd44114baa53016ac528177b56db2693620b8c3255bed6842e9fa70be1e785a7b66a245a82ebe3941573b139d27f3f934550cb18ca99bc76b4eaa67aed625b01715addfabcc868c2e79813ebc06375d315a9c8ebd2414530647b00e982e4fdb3741353f93b7db2e48aeff839a83d93d", @typed={0x8, 0x3e, @uid=r8}, @typed={0x8, 0x2e, @u32=0x7}, @typed={0x8, 0x30, @uid=r9}, @generic="587bea8901c017d2c46ad0b4c368af8932fe0437a21993ea95a993acc9a40b4d7aa8d167d91387ecf493af2af6c1358b1de16782e42f9b254401bd6f46261c00e1b66277d117cf9126caa8180a0aed413a51fdb3db8579f5019b4e6bccbf3f5050b11e4b0dbb1e4fb974bb029d61f22e45bcf22dcd764d5e342cd019744e80e752a164601b97b6c12c74943ae3c06821fd48b048353ba3fd4bb5222d7c0aeb02c1bda6f7e4"]}]}, 0x33c}, {&(0x7f0000001c00)={0x150, 0x19, 0x8, 0x70bd2a, 0x25dfdbff, "", [@generic="86b646b66458f642b2d56d67a7cd8bfe917f16574302677993b2b97da10b2dc27c2ef913cf1475a26a0502532dca1d642f7969b3f395cf4bb1b295dc11619d5a1865fcf24bfff77e9d0351aade9196b74e83a666b028340e79f4fa68b60e011f446727e48266f2d023dc6044b99c87026cbaf5939d329f14322db1fba9fe05ce227045a3dd29f228cefa49f2209de71c2be7", @typed={0x8, 0x59, @ipv4=@multicast2}, @generic="ac3dbe474ede6f14762278a20983a5f7a046bb9fad199f3484599d03f47bbac89a067a7516ba64eb540f4d9704b0a80daa24fd2e8d9e3f424f51597479db2967ff2e313ccba921c31820f737e7213a02ae143e1dac5155ad9009497c4495184856bfea213675fb47bd3bb8628d562bc52bb7ce99546eaa5e8c4b4f636117026e38d9a9f82dec7cf3197c26725d86032e39a744bbea004b2c46cf3ff8c3276880d064143d1197"]}, 0x150}, {&(0x7f0000001d80)={0xf8, 0x1b, 0xa00, 0x70bd2a, 0x25dfdbff, "", [@typed={0xb8, 0x15, @binary="c0c9222e7093a1be913100262f428db82f315bc38208f9cbfbc361186cc3ac806c6ed4cd8b99c9f2ac977919d2a52ca722f8a6aef8ee419568c68ea5b1746060e2c905bd09ce414715d1209f72ae95b3350693c7338493c42a07d7a901885ea4b1dfa9ed127e94be20b08ac40d9ccf455c2f660cf769647e661d63b8fce20cc2459f235f678bc3f626728ab3cc604cd8cba10e214c0ce6dd37c35e0448ecb89884d430748e542cb10e3e7d678f17e9300a2f"}, @generic="863224c939ffb6e922df34d1eac8a93caaa27d4988c5ebdf9e285d2e5a34beffee", @typed={0xc, 0x94, @u64=0x3}]}, 0xf8}], 0x5, &(0x7f0000001f00)=[@rights={{0x28, 0x1, 0x1, [r2, r2, r0, r0, r2, r2]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r2, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r2, r0, r2]}}, @rights={{0x1c, 0x1, 0x1, [r2, r2, r0]}}], 0x88, 0x1}, 0x40) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000002000), &(0x7f0000002040)=0x4) kcmp(r1, r1, 0x7, r0, 0xffffffffffffff9c) 07:54:15 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = geteuid() stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001840)={0x0, 0x0}, &(0x7f0000001880)=0xc) sendmsg$netlink(r2, &(0x7f0000001fc0)={&(0x7f00000002c0)=@proc={0x10, 0x0, 0x25dfdbfd, 0x8280}, 0xc, &(0x7f0000001e80)=[{&(0x7f0000000300)={0x1138, 0x36, 0x200, 0x70bd2d, 0x25dfdbfe, "", [@generic="1c53e8a6f1cdb5ff7be4dc8ec71bedbe2c2fd721fd7fd272577d6af3e5738d412cc426c7320e7b784c685f5154fbcef783af1db492a9deae1602ec0c72cafb1024ac16b2539205ace26ada3ff602c29c4552b97342c3245845edc8620737524aced48855ce003f76776f1b736b704318ac2fef835751a964caf7ecf6e0a2d0f0668cdefb3e23c549112357ee29f54d788fff9822215006bd1f85404b83862055aab50f495aa07ffb662b8ff65d441c0e777f0d27f278799c685c0cfaf347e2d6a105969e75df2e16bc50bba44a0ba8d952fd8eaee947d7d241bc", @generic="b4aee85209072132274dbef659611945c7a6509e7ea518570fba4fc0ff0eb0802e26e4ba4557b641b863dbb2f66698d335d51a6aee1a97a26f47975044d06a05e4469f81b5bc6da79c69d934b528", @generic="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"]}, 0x1138}, {&(0x7f0000001640)={0x134, 0x2d, 0x4, 0x70bd25, 0x25dfdbff, "", [@typed={0x8, 0x48, @uid=r5}, @generic="ccecd26baad47b0427123607ae83ba774c01accde7f5a4eb3c07d51d8f2b76f7dacb81c37ee8feb9a93e7ed566cd25915bd1fb03b2ed0b83943d18120b8c0ec7540993490f341bbea90c30eaae2f59aa013da3c5dec9717861e23b946660cbfbb8e455bc988b246b75634fa6639dd3eccaad11b7d3b21dbeeaad627034e0ae4c583b9eceee555412d2ae11c41f33761f40e39e54802aa3f801d894ced8b48ce35017e9a5946c4f220b00c8bb0c98da208d6c35288dc422", @nested={0x64, 0x2e, [@typed={0x8, 0x62, @str='\x8e!\x00'}, @typed={0x8, 0x5f, @pid=r1}, @generic="1a2a1810efa4fe045f20072d3a33a5d66f0f6880a0ab51991ec30ff8ba0799696ad2a51ae80eb51e4f72376a50b30a3ef3a6", @typed={0x14, 0x3a, @ipv6=@mcast1}, @typed={0x8, 0x5e, @uid=r6}]}]}, 0x134}, {&(0x7f00000018c0)={0x33c, 0x31, 0x0, 0x70bd28, 0x25dfdbfc, "", [@typed={0xc, 0x29, @u64=0x4053}, @generic="2a3f960cac5836828739fe8dfeb92d1ed8b5ca9aeb35e43e076d179368c705bde6dc10a81ec415c5ba31d85c849b7b", @nested={0xf0, 0x94, [@typed={0x4, 0x41}, @generic="0e7eddb333b4e7a8a337f5758802997c7132f86eb85d14ace435e530d3271ec2c2cf50ed434807630c4716cc8c2ebb8af95df9034f8c3b847ef9f73aa00fe20f56e1459a3435cff8e7ac0e128bed506d9595ef8170cf9226e0107e7a8acd7943aec40bfbc125acb2385663c794255e31c387299fa5754da20e7e3e19f2262aae49d0521f82f2f9f6811b7c33968aab85aa209a71f98c4369e2070a84e2e49ecdd25754b043d2058f40bbd254b3d209d8b894682209df84189a387b60e5d60edb78618044f98bd4f52726050a18cf2a40", @typed={0x8, 0x39, @fd=r0}, @typed={0x10, 0x8d, @str='/dev/amidi#\x00'}, @generic]}, @typed={0x8, 0x11, @uid=r7}, @generic="3c22e425f585d87ea13352950304f47af44002d918847c8f02a3873fd64b99301ca5d02991f55a308d20", @nested={0x50, 0x7c, [@generic="87f96ae0afe62df15ed2981d65f01062490e2346a44e5e78ec4662f04168d2073a7a48b47b14903a87c3e8", @typed={0x8, 0x71, @pid=r1}, @typed={0x10, 0x94, @str='/dev/amidi#\x00'}, @typed={0x8, 0x96, @ipv4=@broadcast}]}, @nested={0x17c, 0x12, [@generic="6a036c499a03e99b8020dc549eb7e5b850f60a81610ce31534a02847f2dd58d56bc0be82e8ecee9df6da21c7ea3c5a8cc3d25bc92d82a88c8e25e4df3ef869ffdd31e98c8373e61f1bd44114baa53016ac528177b56db2693620b8c3255bed6842e9fa70be1e785a7b66a245a82ebe3941573b139d27f3f934550cb18ca99bc76b4eaa67aed625b01715addfabcc868c2e79813ebc06375d315a9c8ebd2414530647b00e982e4fdb3741353f93b7db2e48aeff839a83d93d", @typed={0x8, 0x3e, @uid=r8}, @typed={0x8, 0x2e, @u32=0x7}, @typed={0x8, 0x30, @uid=r9}, @generic="587bea8901c017d2c46ad0b4c368af8932fe0437a21993ea95a993acc9a40b4d7aa8d167d91387ecf493af2af6c1358b1de16782e42f9b254401bd6f46261c00e1b66277d117cf9126caa8180a0aed413a51fdb3db8579f5019b4e6bccbf3f5050b11e4b0dbb1e4fb974bb029d61f22e45bcf22dcd764d5e342cd019744e80e752a164601b97b6c12c74943ae3c06821fd48b048353ba3fd4bb5222d7c0aeb02c1bda6f7e4"]}]}, 0x33c}, {&(0x7f0000001c00)={0x150, 0x19, 0x8, 0x70bd2a, 0x25dfdbff, "", [@generic="86b646b66458f642b2d56d67a7cd8bfe917f16574302677993b2b97da10b2dc27c2ef913cf1475a26a0502532dca1d642f7969b3f395cf4bb1b295dc11619d5a1865fcf24bfff77e9d0351aade9196b74e83a666b028340e79f4fa68b60e011f446727e48266f2d023dc6044b99c87026cbaf5939d329f14322db1fba9fe05ce227045a3dd29f228cefa49f2209de71c2be7", @typed={0x8, 0x59, @ipv4=@multicast2}, @generic="ac3dbe474ede6f14762278a20983a5f7a046bb9fad199f3484599d03f47bbac89a067a7516ba64eb540f4d9704b0a80daa24fd2e8d9e3f424f51597479db2967ff2e313ccba921c31820f737e7213a02ae143e1dac5155ad9009497c4495184856bfea213675fb47bd3bb8628d562bc52bb7ce99546eaa5e8c4b4f636117026e38d9a9f82dec7cf3197c26725d86032e39a744bbea004b2c46cf3ff8c3276880d064143d1197"]}, 0x150}, {&(0x7f0000001d80)={0xf8, 0x1b, 0xa00, 0x70bd2a, 0x25dfdbff, "", [@typed={0xb8, 0x15, @binary="c0c9222e7093a1be913100262f428db82f315bc38208f9cbfbc361186cc3ac806c6ed4cd8b99c9f2ac977919d2a52ca722f8a6aef8ee419568c68ea5b1746060e2c905bd09ce414715d1209f72ae95b3350693c7338493c42a07d7a901885ea4b1dfa9ed127e94be20b08ac40d9ccf455c2f660cf769647e661d63b8fce20cc2459f235f678bc3f626728ab3cc604cd8cba10e214c0ce6dd37c35e0448ecb89884d430748e542cb10e3e7d678f17e9300a2f"}, @generic="863224c939ffb6e922df34d1eac8a93caaa27d4988c5ebdf9e285d2e5a34beffee", @typed={0xc, 0x94, @u64=0x3}]}, 0xf8}], 0x5, &(0x7f0000001f00)=[@rights={{0x28, 0x1, 0x1, [r2, r2, r0, r0, r2, r2]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r2, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r2, r0, r2]}}, @rights={{0x1c, 0x1, 0x1, [r2, r2, r0]}}], 0x88, 0x1}, 0x40) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000002000), &(0x7f0000002040)=0x4) sched_yield() 07:54:16 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r1, 0x5d07, 0x5}, 0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000540), &(0x7f0000000580)=0x14) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) io_uring_register$IORING_UNREGISTER_FILES(r3, 0x3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000600)={r1, @in={{0x2, 0x4e22, @loopback}}}, 0x84) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f00000006c0)=0x1) socket$unix(0x1, 0x5, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x113, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000780)={0x4, 0x8, 0xfa00, {r4}}, 0x10) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000007c0)=@int=0x5, 0x4) 07:54:16 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = geteuid() stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001840)={0x0, 0x0}, &(0x7f0000001880)=0xc) sendmsg$netlink(r2, &(0x7f0000001fc0)={&(0x7f00000002c0)=@proc={0x10, 0x0, 0x25dfdbfd, 0x8280}, 0xc, &(0x7f0000001e80)=[{&(0x7f0000000300)={0x1138, 0x36, 0x200, 0x70bd2d, 0x25dfdbfe, "", [@generic="1c53e8a6f1cdb5ff7be4dc8ec71bedbe2c2fd721fd7fd272577d6af3e5738d412cc426c7320e7b784c685f5154fbcef783af1db492a9deae1602ec0c72cafb1024ac16b2539205ace26ada3ff602c29c4552b97342c3245845edc8620737524aced48855ce003f76776f1b736b704318ac2fef835751a964caf7ecf6e0a2d0f0668cdefb3e23c549112357ee29f54d788fff9822215006bd1f85404b83862055aab50f495aa07ffb662b8ff65d441c0e777f0d27f278799c685c0cfaf347e2d6a105969e75df2e16bc50bba44a0ba8d952fd8eaee947d7d241bc", @generic="b4aee85209072132274dbef659611945c7a6509e7ea518570fba4fc0ff0eb0802e26e4ba4557b641b863dbb2f66698d335d51a6aee1a97a26f47975044d06a05e4469f81b5bc6da79c69d934b528", @generic="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"]}, 0x1138}, {&(0x7f0000001640)={0x134, 0x2d, 0x4, 0x70bd25, 0x25dfdbff, "", [@typed={0x8, 0x48, @uid=r5}, @generic="ccecd26baad47b0427123607ae83ba774c01accde7f5a4eb3c07d51d8f2b76f7dacb81c37ee8feb9a93e7ed566cd25915bd1fb03b2ed0b83943d18120b8c0ec7540993490f341bbea90c30eaae2f59aa013da3c5dec9717861e23b946660cbfbb8e455bc988b246b75634fa6639dd3eccaad11b7d3b21dbeeaad627034e0ae4c583b9eceee555412d2ae11c41f33761f40e39e54802aa3f801d894ced8b48ce35017e9a5946c4f220b00c8bb0c98da208d6c35288dc422", @nested={0x64, 0x2e, [@typed={0x8, 0x62, @str='\x8e!\x00'}, @typed={0x8, 0x5f, @pid=r1}, @generic="1a2a1810efa4fe045f20072d3a33a5d66f0f6880a0ab51991ec30ff8ba0799696ad2a51ae80eb51e4f72376a50b30a3ef3a6", @typed={0x14, 0x3a, @ipv6=@mcast1}, @typed={0x8, 0x5e, @uid=r6}]}]}, 0x134}, {&(0x7f00000018c0)={0x33c, 0x31, 0x0, 0x70bd28, 0x25dfdbfc, "", [@typed={0xc, 0x29, @u64=0x4053}, @generic="2a3f960cac5836828739fe8dfeb92d1ed8b5ca9aeb35e43e076d179368c705bde6dc10a81ec415c5ba31d85c849b7b", @nested={0xf0, 0x94, [@typed={0x4, 0x41}, @generic="0e7eddb333b4e7a8a337f5758802997c7132f86eb85d14ace435e530d3271ec2c2cf50ed434807630c4716cc8c2ebb8af95df9034f8c3b847ef9f73aa00fe20f56e1459a3435cff8e7ac0e128bed506d9595ef8170cf9226e0107e7a8acd7943aec40bfbc125acb2385663c794255e31c387299fa5754da20e7e3e19f2262aae49d0521f82f2f9f6811b7c33968aab85aa209a71f98c4369e2070a84e2e49ecdd25754b043d2058f40bbd254b3d209d8b894682209df84189a387b60e5d60edb78618044f98bd4f52726050a18cf2a40", @typed={0x8, 0x39, @fd=r0}, @typed={0x10, 0x8d, @str='/dev/amidi#\x00'}, @generic]}, @typed={0x8, 0x11, @uid=r7}, @generic="3c22e425f585d87ea13352950304f47af44002d918847c8f02a3873fd64b99301ca5d02991f55a308d20", @nested={0x50, 0x7c, [@generic="87f96ae0afe62df15ed2981d65f01062490e2346a44e5e78ec4662f04168d2073a7a48b47b14903a87c3e8", @typed={0x8, 0x71, @pid=r1}, @typed={0x10, 0x94, @str='/dev/amidi#\x00'}, @typed={0x8, 0x96, @ipv4=@broadcast}]}, @nested={0x17c, 0x12, [@generic="6a036c499a03e99b8020dc549eb7e5b850f60a81610ce31534a02847f2dd58d56bc0be82e8ecee9df6da21c7ea3c5a8cc3d25bc92d82a88c8e25e4df3ef869ffdd31e98c8373e61f1bd44114baa53016ac528177b56db2693620b8c3255bed6842e9fa70be1e785a7b66a245a82ebe3941573b139d27f3f934550cb18ca99bc76b4eaa67aed625b01715addfabcc868c2e79813ebc06375d315a9c8ebd2414530647b00e982e4fdb3741353f93b7db2e48aeff839a83d93d", @typed={0x8, 0x3e, @uid=r8}, @typed={0x8, 0x2e, @u32=0x7}, @typed={0x8, 0x30, @uid=r9}, @generic="587bea8901c017d2c46ad0b4c368af8932fe0437a21993ea95a993acc9a40b4d7aa8d167d91387ecf493af2af6c1358b1de16782e42f9b254401bd6f46261c00e1b66277d117cf9126caa8180a0aed413a51fdb3db8579f5019b4e6bccbf3f5050b11e4b0dbb1e4fb974bb029d61f22e45bcf22dcd764d5e342cd019744e80e752a164601b97b6c12c74943ae3c06821fd48b048353ba3fd4bb5222d7c0aeb02c1bda6f7e4"]}]}, 0x33c}, {&(0x7f0000001c00)={0x150, 0x19, 0x8, 0x70bd2a, 0x25dfdbff, "", [@generic="86b646b66458f642b2d56d67a7cd8bfe917f16574302677993b2b97da10b2dc27c2ef913cf1475a26a0502532dca1d642f7969b3f395cf4bb1b295dc11619d5a1865fcf24bfff77e9d0351aade9196b74e83a666b028340e79f4fa68b60e011f446727e48266f2d023dc6044b99c87026cbaf5939d329f14322db1fba9fe05ce227045a3dd29f228cefa49f2209de71c2be7", @typed={0x8, 0x59, @ipv4=@multicast2}, @generic="ac3dbe474ede6f14762278a20983a5f7a046bb9fad199f3484599d03f47bbac89a067a7516ba64eb540f4d9704b0a80daa24fd2e8d9e3f424f51597479db2967ff2e313ccba921c31820f737e7213a02ae143e1dac5155ad9009497c4495184856bfea213675fb47bd3bb8628d562bc52bb7ce99546eaa5e8c4b4f636117026e38d9a9f82dec7cf3197c26725d86032e39a744bbea004b2c46cf3ff8c3276880d064143d1197"]}, 0x150}, {&(0x7f0000001d80)={0xf8, 0x1b, 0xa00, 0x70bd2a, 0x25dfdbff, "", [@typed={0xb8, 0x15, @binary="c0c9222e7093a1be913100262f428db82f315bc38208f9cbfbc361186cc3ac806c6ed4cd8b99c9f2ac977919d2a52ca722f8a6aef8ee419568c68ea5b1746060e2c905bd09ce414715d1209f72ae95b3350693c7338493c42a07d7a901885ea4b1dfa9ed127e94be20b08ac40d9ccf455c2f660cf769647e661d63b8fce20cc2459f235f678bc3f626728ab3cc604cd8cba10e214c0ce6dd37c35e0448ecb89884d430748e542cb10e3e7d678f17e9300a2f"}, @generic="863224c939ffb6e922df34d1eac8a93caaa27d4988c5ebdf9e285d2e5a34beffee", @typed={0xc, 0x94, @u64=0x3}]}, 0xf8}], 0x5, &(0x7f0000001f00)=[@rights={{0x28, 0x1, 0x1, [r2, r2, r0, r0, r2, r2]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r2, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r2, r0, r2]}}, @rights={{0x1c, 0x1, 0x1, [r2, r2, r0]}}], 0x88, 0x1}, 0x40) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000002000), &(0x7f0000002040)=0x4) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f0000002080)=0x1, 0x4) recvmmsg(r2, &(0x7f00000038c0)=[{{&(0x7f00000020c0)=@xdp, 0x80, &(0x7f0000003140)=[{&(0x7f0000002140)=""/4096, 0x1000}], 0x1, &(0x7f0000003180)=""/161, 0xa1}, 0x2}, {{&(0x7f0000003240)=@alg, 0x80, &(0x7f00000035c0)=[{&(0x7f00000032c0)=""/90, 0x5a}, {&(0x7f0000003340)}, {&(0x7f0000003380)=""/71, 0x47}, {&(0x7f0000003400)=""/18, 0x12}, {&(0x7f0000003440)=""/108, 0x6c}, {&(0x7f00000034c0)=""/120, 0x78}, {&(0x7f0000003540)=""/103, 0x67}], 0x7}, 0x7f}, {{&(0x7f0000003640)=@caif=@util, 0x80, &(0x7f0000003800)=[{&(0x7f00000036c0)=""/89, 0x59}, {&(0x7f0000003740)=""/28, 0x1c}, {&(0x7f0000003780)=""/100, 0x64}], 0x3, &(0x7f0000003840)=""/112, 0x70}, 0xfffffffffffff11a}], 0x3, 0x40000000, &(0x7f0000003980)={0x77359400}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000001, 0x5050, r2, 0x0) 07:54:16 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000080)={0x3e, &(0x7f0000000040)=""/62}) pread64(r0, &(0x7f00000000c0)=""/4096, 0x1000, 0x0) sendto$rxrpc(r0, &(0x7f00000010c0)="01e8dce1faf9e2880d42a5f69f436a8dd04a628a167af0140aee65d16dfdfe8d2d0b8a6a5cc139941dc22ad75a0fb526e31910c09e503a9bbc8dec9ac1f36d1afed38e53750c4421ef50e86611498bcd0fa984630d365e127f5c3a65e7a6cbd0c30e2970d7bae8fbf07d9dd474fa9abe13fa19481d011779ecbce45fd8f57a12844bbcc3275fe7ba65ef5e8cfab8998003ff2813a604b889f9e951f78a8d769869f08ffe816ae6d0eb412bdf93133364bc849925f4ebc4f4bbe3650175962f49104915f017b1d387954ef6ee69b2fdd4cc67058f0e2840eb48bae782e3a94b8677b0bd318cdb2830", 0xe8, 0x4000000, 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f00000011c0)={0x3, 0x3}) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f0000001200)=""/130) getresuid(&(0x7f00000012c0), &(0x7f0000001300)=0x0, &(0x7f0000001340)) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000001380)={0x3, @null, r2}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000008, 0x1010, r1, 0x0) io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x3c4}) io_setup(0x1ff, &(0x7f0000001440)=0x0) io_getevents(r3, 0x4d, 0x6, &(0x7f0000001480)=[{}, {}, {}, {}, {}, {}], &(0x7f0000001540)) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000001580)={{0x2, 0x4e21, @rand_addr=0x80000000}, {}, 0x2, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'rose0\x00'}) 07:54:16 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r1, 0x5d07, 0x5}, 0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000540), &(0x7f0000000580)=0x14) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) io_uring_register$IORING_UNREGISTER_FILES(r3, 0x3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000600)={r1, @in={{0x2, 0x4e22, @loopback}}}, 0x84) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f00000006c0)=0x1) socket$unix(0x1, 0x5, 0x0) write$P9_RGETLOCK(r3, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:16 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = geteuid() stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001840)={0x0, 0x0}, &(0x7f0000001880)=0xc) sendmsg$netlink(r2, &(0x7f0000001fc0)={&(0x7f00000002c0)=@proc={0x10, 0x0, 0x25dfdbfd, 0x8280}, 0xc, &(0x7f0000001e80)=[{&(0x7f0000000300)={0x1138, 0x36, 0x200, 0x70bd2d, 0x25dfdbfe, "", [@generic="1c53e8a6f1cdb5ff7be4dc8ec71bedbe2c2fd721fd7fd272577d6af3e5738d412cc426c7320e7b784c685f5154fbcef783af1db492a9deae1602ec0c72cafb1024ac16b2539205ace26ada3ff602c29c4552b97342c3245845edc8620737524aced48855ce003f76776f1b736b704318ac2fef835751a964caf7ecf6e0a2d0f0668cdefb3e23c549112357ee29f54d788fff9822215006bd1f85404b83862055aab50f495aa07ffb662b8ff65d441c0e777f0d27f278799c685c0cfaf347e2d6a105969e75df2e16bc50bba44a0ba8d952fd8eaee947d7d241bc", @generic="b4aee85209072132274dbef659611945c7a6509e7ea518570fba4fc0ff0eb0802e26e4ba4557b641b863dbb2f66698d335d51a6aee1a97a26f47975044d06a05e4469f81b5bc6da79c69d934b528", @generic="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"]}, 0x1138}, {&(0x7f0000001640)={0x134, 0x2d, 0x4, 0x70bd25, 0x25dfdbff, "", [@typed={0x8, 0x48, @uid=r5}, @generic="ccecd26baad47b0427123607ae83ba774c01accde7f5a4eb3c07d51d8f2b76f7dacb81c37ee8feb9a93e7ed566cd25915bd1fb03b2ed0b83943d18120b8c0ec7540993490f341bbea90c30eaae2f59aa013da3c5dec9717861e23b946660cbfbb8e455bc988b246b75634fa6639dd3eccaad11b7d3b21dbeeaad627034e0ae4c583b9eceee555412d2ae11c41f33761f40e39e54802aa3f801d894ced8b48ce35017e9a5946c4f220b00c8bb0c98da208d6c35288dc422", @nested={0x64, 0x2e, [@typed={0x8, 0x62, @str='\x8e!\x00'}, @typed={0x8, 0x5f, @pid=r1}, @generic="1a2a1810efa4fe045f20072d3a33a5d66f0f6880a0ab51991ec30ff8ba0799696ad2a51ae80eb51e4f72376a50b30a3ef3a6", @typed={0x14, 0x3a, @ipv6=@mcast1}, @typed={0x8, 0x5e, @uid=r6}]}]}, 0x134}, {&(0x7f00000018c0)={0x33c, 0x31, 0x0, 0x70bd28, 0x25dfdbfc, "", [@typed={0xc, 0x29, @u64=0x4053}, @generic="2a3f960cac5836828739fe8dfeb92d1ed8b5ca9aeb35e43e076d179368c705bde6dc10a81ec415c5ba31d85c849b7b", @nested={0xf0, 0x94, [@typed={0x4, 0x41}, @generic="0e7eddb333b4e7a8a337f5758802997c7132f86eb85d14ace435e530d3271ec2c2cf50ed434807630c4716cc8c2ebb8af95df9034f8c3b847ef9f73aa00fe20f56e1459a3435cff8e7ac0e128bed506d9595ef8170cf9226e0107e7a8acd7943aec40bfbc125acb2385663c794255e31c387299fa5754da20e7e3e19f2262aae49d0521f82f2f9f6811b7c33968aab85aa209a71f98c4369e2070a84e2e49ecdd25754b043d2058f40bbd254b3d209d8b894682209df84189a387b60e5d60edb78618044f98bd4f52726050a18cf2a40", @typed={0x8, 0x39, @fd=r0}, @typed={0x10, 0x8d, @str='/dev/amidi#\x00'}, @generic]}, @typed={0x8, 0x11, @uid=r7}, @generic="3c22e425f585d87ea13352950304f47af44002d918847c8f02a3873fd64b99301ca5d02991f55a308d20", @nested={0x50, 0x7c, [@generic="87f96ae0afe62df15ed2981d65f01062490e2346a44e5e78ec4662f04168d2073a7a48b47b14903a87c3e8", @typed={0x8, 0x71, @pid=r1}, @typed={0x10, 0x94, @str='/dev/amidi#\x00'}, @typed={0x8, 0x96, @ipv4=@broadcast}]}, @nested={0x17c, 0x12, [@generic="6a036c499a03e99b8020dc549eb7e5b850f60a81610ce31534a02847f2dd58d56bc0be82e8ecee9df6da21c7ea3c5a8cc3d25bc92d82a88c8e25e4df3ef869ffdd31e98c8373e61f1bd44114baa53016ac528177b56db2693620b8c3255bed6842e9fa70be1e785a7b66a245a82ebe3941573b139d27f3f934550cb18ca99bc76b4eaa67aed625b01715addfabcc868c2e79813ebc06375d315a9c8ebd2414530647b00e982e4fdb3741353f93b7db2e48aeff839a83d93d", @typed={0x8, 0x3e, @uid=r8}, @typed={0x8, 0x2e, @u32=0x7}, @typed={0x8, 0x30, @uid=r9}, @generic="587bea8901c017d2c46ad0b4c368af8932fe0437a21993ea95a993acc9a40b4d7aa8d167d91387ecf493af2af6c1358b1de16782e42f9b254401bd6f46261c00e1b66277d117cf9126caa8180a0aed413a51fdb3db8579f5019b4e6bccbf3f5050b11e4b0dbb1e4fb974bb029d61f22e45bcf22dcd764d5e342cd019744e80e752a164601b97b6c12c74943ae3c06821fd48b048353ba3fd4bb5222d7c0aeb02c1bda6f7e4"]}]}, 0x33c}, {&(0x7f0000001c00)={0x150, 0x19, 0x8, 0x70bd2a, 0x25dfdbff, "", [@generic="86b646b66458f642b2d56d67a7cd8bfe917f16574302677993b2b97da10b2dc27c2ef913cf1475a26a0502532dca1d642f7969b3f395cf4bb1b295dc11619d5a1865fcf24bfff77e9d0351aade9196b74e83a666b028340e79f4fa68b60e011f446727e48266f2d023dc6044b99c87026cbaf5939d329f14322db1fba9fe05ce227045a3dd29f228cefa49f2209de71c2be7", @typed={0x8, 0x59, @ipv4=@multicast2}, @generic="ac3dbe474ede6f14762278a20983a5f7a046bb9fad199f3484599d03f47bbac89a067a7516ba64eb540f4d9704b0a80daa24fd2e8d9e3f424f51597479db2967ff2e313ccba921c31820f737e7213a02ae143e1dac5155ad9009497c4495184856bfea213675fb47bd3bb8628d562bc52bb7ce99546eaa5e8c4b4f636117026e38d9a9f82dec7cf3197c26725d86032e39a744bbea004b2c46cf3ff8c3276880d064143d1197"]}, 0x150}, {&(0x7f0000001d80)={0xf8, 0x1b, 0xa00, 0x70bd2a, 0x25dfdbff, "", [@typed={0xb8, 0x15, @binary="c0c9222e7093a1be913100262f428db82f315bc38208f9cbfbc361186cc3ac806c6ed4cd8b99c9f2ac977919d2a52ca722f8a6aef8ee419568c68ea5b1746060e2c905bd09ce414715d1209f72ae95b3350693c7338493c42a07d7a901885ea4b1dfa9ed127e94be20b08ac40d9ccf455c2f660cf769647e661d63b8fce20cc2459f235f678bc3f626728ab3cc604cd8cba10e214c0ce6dd37c35e0448ecb89884d430748e542cb10e3e7d678f17e9300a2f"}, @generic="863224c939ffb6e922df34d1eac8a93caaa27d4988c5ebdf9e285d2e5a34beffee", @typed={0xc, 0x94, @u64=0x3}]}, 0xf8}], 0x5, &(0x7f0000001f00)=[@rights={{0x28, 0x1, 0x1, [r2, r2, r0, r0, r2, r2]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r2, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r2, r0, r2]}}, @rights={{0x1c, 0x1, 0x1, [r2, r2, r0]}}], 0x88, 0x1}, 0x40) kcmp(r1, r1, 0x7, r0, 0xffffffffffffff9c) 07:54:16 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = geteuid() stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001840)={0x0, 0x0}, &(0x7f0000001880)=0xc) sendmsg$netlink(r2, &(0x7f0000001fc0)={&(0x7f00000002c0)=@proc={0x10, 0x0, 0x25dfdbfd, 0x8280}, 0xc, &(0x7f0000001e80)=[{&(0x7f0000000300)={0x1138, 0x36, 0x200, 0x70bd2d, 0x25dfdbfe, "", [@generic="1c53e8a6f1cdb5ff7be4dc8ec71bedbe2c2fd721fd7fd272577d6af3e5738d412cc426c7320e7b784c685f5154fbcef783af1db492a9deae1602ec0c72cafb1024ac16b2539205ace26ada3ff602c29c4552b97342c3245845edc8620737524aced48855ce003f76776f1b736b704318ac2fef835751a964caf7ecf6e0a2d0f0668cdefb3e23c549112357ee29f54d788fff9822215006bd1f85404b83862055aab50f495aa07ffb662b8ff65d441c0e777f0d27f278799c685c0cfaf347e2d6a105969e75df2e16bc50bba44a0ba8d952fd8eaee947d7d241bc", @generic="b4aee85209072132274dbef659611945c7a6509e7ea518570fba4fc0ff0eb0802e26e4ba4557b641b863dbb2f66698d335d51a6aee1a97a26f47975044d06a05e4469f81b5bc6da79c69d934b528", @generic="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"]}, 0x1138}, {&(0x7f0000001640)={0x134, 0x2d, 0x4, 0x70bd25, 0x25dfdbff, "", [@typed={0x8, 0x48, @uid=r5}, @generic="ccecd26baad47b0427123607ae83ba774c01accde7f5a4eb3c07d51d8f2b76f7dacb81c37ee8feb9a93e7ed566cd25915bd1fb03b2ed0b83943d18120b8c0ec7540993490f341bbea90c30eaae2f59aa013da3c5dec9717861e23b946660cbfbb8e455bc988b246b75634fa6639dd3eccaad11b7d3b21dbeeaad627034e0ae4c583b9eceee555412d2ae11c41f33761f40e39e54802aa3f801d894ced8b48ce35017e9a5946c4f220b00c8bb0c98da208d6c35288dc422", @nested={0x64, 0x2e, [@typed={0x8, 0x62, @str='\x8e!\x00'}, @typed={0x8, 0x5f, @pid=r1}, @generic="1a2a1810efa4fe045f20072d3a33a5d66f0f6880a0ab51991ec30ff8ba0799696ad2a51ae80eb51e4f72376a50b30a3ef3a6", @typed={0x14, 0x3a, @ipv6=@mcast1}, @typed={0x8, 0x5e, @uid=r6}]}]}, 0x134}, {&(0x7f00000018c0)={0x33c, 0x31, 0x0, 0x70bd28, 0x25dfdbfc, "", [@typed={0xc, 0x29, @u64=0x4053}, @generic="2a3f960cac5836828739fe8dfeb92d1ed8b5ca9aeb35e43e076d179368c705bde6dc10a81ec415c5ba31d85c849b7b", @nested={0xf0, 0x94, [@typed={0x4, 0x41}, @generic="0e7eddb333b4e7a8a337f5758802997c7132f86eb85d14ace435e530d3271ec2c2cf50ed434807630c4716cc8c2ebb8af95df9034f8c3b847ef9f73aa00fe20f56e1459a3435cff8e7ac0e128bed506d9595ef8170cf9226e0107e7a8acd7943aec40bfbc125acb2385663c794255e31c387299fa5754da20e7e3e19f2262aae49d0521f82f2f9f6811b7c33968aab85aa209a71f98c4369e2070a84e2e49ecdd25754b043d2058f40bbd254b3d209d8b894682209df84189a387b60e5d60edb78618044f98bd4f52726050a18cf2a40", @typed={0x8, 0x39, @fd=r0}, @typed={0x10, 0x8d, @str='/dev/amidi#\x00'}, @generic]}, @typed={0x8, 0x11, @uid=r7}, @generic="3c22e425f585d87ea13352950304f47af44002d918847c8f02a3873fd64b99301ca5d02991f55a308d20", @nested={0x50, 0x7c, [@generic="87f96ae0afe62df15ed2981d65f01062490e2346a44e5e78ec4662f04168d2073a7a48b47b14903a87c3e8", @typed={0x8, 0x71, @pid=r1}, @typed={0x10, 0x94, @str='/dev/amidi#\x00'}, @typed={0x8, 0x96, @ipv4=@broadcast}]}, @nested={0x17c, 0x12, [@generic="6a036c499a03e99b8020dc549eb7e5b850f60a81610ce31534a02847f2dd58d56bc0be82e8ecee9df6da21c7ea3c5a8cc3d25bc92d82a88c8e25e4df3ef869ffdd31e98c8373e61f1bd44114baa53016ac528177b56db2693620b8c3255bed6842e9fa70be1e785a7b66a245a82ebe3941573b139d27f3f934550cb18ca99bc76b4eaa67aed625b01715addfabcc868c2e79813ebc06375d315a9c8ebd2414530647b00e982e4fdb3741353f93b7db2e48aeff839a83d93d", @typed={0x8, 0x3e, @uid=r8}, @typed={0x8, 0x2e, @u32=0x7}, @typed={0x8, 0x30, @uid=r9}, @generic="587bea8901c017d2c46ad0b4c368af8932fe0437a21993ea95a993acc9a40b4d7aa8d167d91387ecf493af2af6c1358b1de16782e42f9b254401bd6f46261c00e1b66277d117cf9126caa8180a0aed413a51fdb3db8579f5019b4e6bccbf3f5050b11e4b0dbb1e4fb974bb029d61f22e45bcf22dcd764d5e342cd019744e80e752a164601b97b6c12c74943ae3c06821fd48b048353ba3fd4bb5222d7c0aeb02c1bda6f7e4"]}]}, 0x33c}, {&(0x7f0000001c00)={0x150, 0x19, 0x8, 0x70bd2a, 0x25dfdbff, "", [@generic="86b646b66458f642b2d56d67a7cd8bfe917f16574302677993b2b97da10b2dc27c2ef913cf1475a26a0502532dca1d642f7969b3f395cf4bb1b295dc11619d5a1865fcf24bfff77e9d0351aade9196b74e83a666b028340e79f4fa68b60e011f446727e48266f2d023dc6044b99c87026cbaf5939d329f14322db1fba9fe05ce227045a3dd29f228cefa49f2209de71c2be7", @typed={0x8, 0x59, @ipv4=@multicast2}, @generic="ac3dbe474ede6f14762278a20983a5f7a046bb9fad199f3484599d03f47bbac89a067a7516ba64eb540f4d9704b0a80daa24fd2e8d9e3f424f51597479db2967ff2e313ccba921c31820f737e7213a02ae143e1dac5155ad9009497c4495184856bfea213675fb47bd3bb8628d562bc52bb7ce99546eaa5e8c4b4f636117026e38d9a9f82dec7cf3197c26725d86032e39a744bbea004b2c46cf3ff8c3276880d064143d1197"]}, 0x150}, {&(0x7f0000001d80)={0xf8, 0x1b, 0xa00, 0x70bd2a, 0x25dfdbff, "", [@typed={0xb8, 0x15, @binary="c0c9222e7093a1be913100262f428db82f315bc38208f9cbfbc361186cc3ac806c6ed4cd8b99c9f2ac977919d2a52ca722f8a6aef8ee419568c68ea5b1746060e2c905bd09ce414715d1209f72ae95b3350693c7338493c42a07d7a901885ea4b1dfa9ed127e94be20b08ac40d9ccf455c2f660cf769647e661d63b8fce20cc2459f235f678bc3f626728ab3cc604cd8cba10e214c0ce6dd37c35e0448ecb89884d430748e542cb10e3e7d678f17e9300a2f"}, @generic="863224c939ffb6e922df34d1eac8a93caaa27d4988c5ebdf9e285d2e5a34beffee", @typed={0xc, 0x94, @u64=0x3}]}, 0xf8}], 0x5, &(0x7f0000001f00)=[@rights={{0x28, 0x1, 0x1, [r2, r2, r0, r0, r2, r2]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r2, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r2, r0, r2]}}, @rights={{0x1c, 0x1, 0x1, [r2, r2, r0]}}], 0x88, 0x1}, 0x40) sched_yield() 07:54:16 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = geteuid() stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001840)={0x0, 0x0}, &(0x7f0000001880)=0xc) sendmsg$netlink(r2, &(0x7f0000001fc0)={&(0x7f00000002c0)=@proc={0x10, 0x0, 0x25dfdbfd, 0x8280}, 0xc, &(0x7f0000001e80)=[{&(0x7f0000000300)={0x1138, 0x36, 0x200, 0x70bd2d, 0x25dfdbfe, "", [@generic="1c53e8a6f1cdb5ff7be4dc8ec71bedbe2c2fd721fd7fd272577d6af3e5738d412cc426c7320e7b784c685f5154fbcef783af1db492a9deae1602ec0c72cafb1024ac16b2539205ace26ada3ff602c29c4552b97342c3245845edc8620737524aced48855ce003f76776f1b736b704318ac2fef835751a964caf7ecf6e0a2d0f0668cdefb3e23c549112357ee29f54d788fff9822215006bd1f85404b83862055aab50f495aa07ffb662b8ff65d441c0e777f0d27f278799c685c0cfaf347e2d6a105969e75df2e16bc50bba44a0ba8d952fd8eaee947d7d241bc", @generic="b4aee85209072132274dbef659611945c7a6509e7ea518570fba4fc0ff0eb0802e26e4ba4557b641b863dbb2f66698d335d51a6aee1a97a26f47975044d06a05e4469f81b5bc6da79c69d934b528", @generic="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"]}, 0x1138}, {&(0x7f0000001640)={0x134, 0x2d, 0x4, 0x70bd25, 0x25dfdbff, "", [@typed={0x8, 0x48, @uid=r5}, @generic="ccecd26baad47b0427123607ae83ba774c01accde7f5a4eb3c07d51d8f2b76f7dacb81c37ee8feb9a93e7ed566cd25915bd1fb03b2ed0b83943d18120b8c0ec7540993490f341bbea90c30eaae2f59aa013da3c5dec9717861e23b946660cbfbb8e455bc988b246b75634fa6639dd3eccaad11b7d3b21dbeeaad627034e0ae4c583b9eceee555412d2ae11c41f33761f40e39e54802aa3f801d894ced8b48ce35017e9a5946c4f220b00c8bb0c98da208d6c35288dc422", @nested={0x64, 0x2e, [@typed={0x8, 0x62, @str='\x8e!\x00'}, @typed={0x8, 0x5f, @pid=r1}, @generic="1a2a1810efa4fe045f20072d3a33a5d66f0f6880a0ab51991ec30ff8ba0799696ad2a51ae80eb51e4f72376a50b30a3ef3a6", @typed={0x14, 0x3a, @ipv6=@mcast1}, @typed={0x8, 0x5e, @uid=r6}]}]}, 0x134}, {&(0x7f00000018c0)={0x33c, 0x31, 0x0, 0x70bd28, 0x25dfdbfc, "", [@typed={0xc, 0x29, @u64=0x4053}, @generic="2a3f960cac5836828739fe8dfeb92d1ed8b5ca9aeb35e43e076d179368c705bde6dc10a81ec415c5ba31d85c849b7b", @nested={0xf0, 0x94, [@typed={0x4, 0x41}, @generic="0e7eddb333b4e7a8a337f5758802997c7132f86eb85d14ace435e530d3271ec2c2cf50ed434807630c4716cc8c2ebb8af95df9034f8c3b847ef9f73aa00fe20f56e1459a3435cff8e7ac0e128bed506d9595ef8170cf9226e0107e7a8acd7943aec40bfbc125acb2385663c794255e31c387299fa5754da20e7e3e19f2262aae49d0521f82f2f9f6811b7c33968aab85aa209a71f98c4369e2070a84e2e49ecdd25754b043d2058f40bbd254b3d209d8b894682209df84189a387b60e5d60edb78618044f98bd4f52726050a18cf2a40", @typed={0x8, 0x39, @fd=r0}, @typed={0x10, 0x8d, @str='/dev/amidi#\x00'}, @generic]}, @typed={0x8, 0x11, @uid=r7}, @generic="3c22e425f585d87ea13352950304f47af44002d918847c8f02a3873fd64b99301ca5d02991f55a308d20", @nested={0x50, 0x7c, [@generic="87f96ae0afe62df15ed2981d65f01062490e2346a44e5e78ec4662f04168d2073a7a48b47b14903a87c3e8", @typed={0x8, 0x71, @pid=r1}, @typed={0x10, 0x94, @str='/dev/amidi#\x00'}, @typed={0x8, 0x96, @ipv4=@broadcast}]}, @nested={0x17c, 0x12, [@generic="6a036c499a03e99b8020dc549eb7e5b850f60a81610ce31534a02847f2dd58d56bc0be82e8ecee9df6da21c7ea3c5a8cc3d25bc92d82a88c8e25e4df3ef869ffdd31e98c8373e61f1bd44114baa53016ac528177b56db2693620b8c3255bed6842e9fa70be1e785a7b66a245a82ebe3941573b139d27f3f934550cb18ca99bc76b4eaa67aed625b01715addfabcc868c2e79813ebc06375d315a9c8ebd2414530647b00e982e4fdb3741353f93b7db2e48aeff839a83d93d", @typed={0x8, 0x3e, @uid=r8}, @typed={0x8, 0x2e, @u32=0x7}, @typed={0x8, 0x30, @uid=r9}, @generic="587bea8901c017d2c46ad0b4c368af8932fe0437a21993ea95a993acc9a40b4d7aa8d167d91387ecf493af2af6c1358b1de16782e42f9b254401bd6f46261c00e1b66277d117cf9126caa8180a0aed413a51fdb3db8579f5019b4e6bccbf3f5050b11e4b0dbb1e4fb974bb029d61f22e45bcf22dcd764d5e342cd019744e80e752a164601b97b6c12c74943ae3c06821fd48b048353ba3fd4bb5222d7c0aeb02c1bda6f7e4"]}]}, 0x33c}, {&(0x7f0000001c00)={0x150, 0x19, 0x8, 0x70bd2a, 0x25dfdbff, "", [@generic="86b646b66458f642b2d56d67a7cd8bfe917f16574302677993b2b97da10b2dc27c2ef913cf1475a26a0502532dca1d642f7969b3f395cf4bb1b295dc11619d5a1865fcf24bfff77e9d0351aade9196b74e83a666b028340e79f4fa68b60e011f446727e48266f2d023dc6044b99c87026cbaf5939d329f14322db1fba9fe05ce227045a3dd29f228cefa49f2209de71c2be7", @typed={0x8, 0x59, @ipv4=@multicast2}, @generic="ac3dbe474ede6f14762278a20983a5f7a046bb9fad199f3484599d03f47bbac89a067a7516ba64eb540f4d9704b0a80daa24fd2e8d9e3f424f51597479db2967ff2e313ccba921c31820f737e7213a02ae143e1dac5155ad9009497c4495184856bfea213675fb47bd3bb8628d562bc52bb7ce99546eaa5e8c4b4f636117026e38d9a9f82dec7cf3197c26725d86032e39a744bbea004b2c46cf3ff8c3276880d064143d1197"]}, 0x150}, {&(0x7f0000001d80)={0xf8, 0x1b, 0xa00, 0x70bd2a, 0x25dfdbff, "", [@typed={0xb8, 0x15, @binary="c0c9222e7093a1be913100262f428db82f315bc38208f9cbfbc361186cc3ac806c6ed4cd8b99c9f2ac977919d2a52ca722f8a6aef8ee419568c68ea5b1746060e2c905bd09ce414715d1209f72ae95b3350693c7338493c42a07d7a901885ea4b1dfa9ed127e94be20b08ac40d9ccf455c2f660cf769647e661d63b8fce20cc2459f235f678bc3f626728ab3cc604cd8cba10e214c0ce6dd37c35e0448ecb89884d430748e542cb10e3e7d678f17e9300a2f"}, @generic="863224c939ffb6e922df34d1eac8a93caaa27d4988c5ebdf9e285d2e5a34beffee", @typed={0xc, 0x94, @u64=0x3}]}, 0xf8}], 0x5, &(0x7f0000001f00)=[@rights={{0x28, 0x1, 0x1, [r2, r2, r0, r0, r2, r2]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r2, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r2, r0, r2]}}, @rights={{0x1c, 0x1, 0x1, [r2, r2, r0]}}], 0x88, 0x1}, 0x40) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000002000), &(0x7f0000002040)=0x4) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f0000002080)=0x1, 0x4) recvmmsg(r2, &(0x7f00000038c0)=[{{&(0x7f00000020c0)=@xdp, 0x80, &(0x7f0000003140)=[{&(0x7f0000002140)=""/4096, 0x1000}], 0x1, &(0x7f0000003180)=""/161, 0xa1}, 0x2}, {{&(0x7f0000003240)=@alg, 0x80, &(0x7f00000035c0)=[{&(0x7f00000032c0)=""/90, 0x5a}, {&(0x7f0000003340)}, {&(0x7f0000003380)=""/71, 0x47}, {&(0x7f0000003400)=""/18, 0x12}, {&(0x7f0000003440)=""/108, 0x6c}, {&(0x7f00000034c0)=""/120, 0x78}, {&(0x7f0000003540)=""/103, 0x67}], 0x7}, 0x7f}, {{&(0x7f0000003640)=@caif=@util, 0x80, &(0x7f0000003800)=[{&(0x7f00000036c0)=""/89, 0x59}, {&(0x7f0000003740)=""/28, 0x1c}, {&(0x7f0000003780)=""/100, 0x64}], 0x3, &(0x7f0000003840)=""/112, 0x70}, 0xfffffffffffff11a}], 0x3, 0x40000000, &(0x7f0000003980)={0x77359400}) 07:54:16 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)) geteuid() stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001840), &(0x7f0000001880)=0xc) kcmp(r1, r1, 0x7, r0, 0xffffffffffffff9c) 07:54:16 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)) geteuid() stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001840), &(0x7f0000001880)=0xc) sched_yield() 07:54:16 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r1, 0x5d07, 0x5}, 0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000540), &(0x7f0000000580)=0x14) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) io_uring_register$IORING_UNREGISTER_FILES(r3, 0x3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000600)={r1, @in={{0x2, 0x4e22, @loopback}}}, 0x84) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f00000006c0)=0x1) socket$unix(0x1, 0x5, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x113, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000780)={0x4, 0x8, 0xfa00, {r4}}, 0x10) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000007c0)=@int=0x5, 0x4) 07:54:16 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r1, 0x5d07, 0x5}, 0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000540), &(0x7f0000000580)=0x14) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) io_uring_register$IORING_UNREGISTER_FILES(r3, 0x3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000600)={r1, @in={{0x2, 0x4e22, @loopback}}}, 0x84) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f00000006c0)=0x1) socket$unix(0x1, 0x5, 0x0) write$P9_RGETLOCK(r3, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:16 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000080)={0x3e, &(0x7f0000000040)=""/62}) pread64(r0, &(0x7f00000000c0)=""/4096, 0x1000, 0x0) sendto$rxrpc(r0, &(0x7f00000010c0)="01e8dce1faf9e2880d42a5f69f436a8dd04a628a167af0140aee65d16dfdfe8d2d0b8a6a5cc139941dc22ad75a0fb526e31910c09e503a9bbc8dec9ac1f36d1afed38e53750c4421ef50e86611498bcd0fa984630d365e127f5c3a65e7a6cbd0c30e2970d7bae8fbf07d9dd474fa9abe13fa19481d011779ecbce45fd8f57a12844bbcc3275fe7ba65ef5e8cfab8998003ff2813a604b889f9e951f78a8d769869f08ffe816ae6d0eb412bdf93133364bc849925f4ebc4f4bbe3650175962f49104915f017b1d387954ef6ee69b2fdd4cc67058f0e2840eb48bae782e3a94b8677b0bd318cdb2830", 0xe8, 0x4000000, 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f00000011c0)={0x3, 0x3}) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f0000001200)=""/130) getresuid(&(0x7f00000012c0), &(0x7f0000001300)=0x0, &(0x7f0000001340)) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000001380)={0x3, @null, r2}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000008, 0x1010, r1, 0x0) io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x3c4}) io_setup(0x1ff, &(0x7f0000001440)=0x0) io_getevents(r3, 0x4d, 0x6, &(0x7f0000001480)=[{}, {}, {}, {}, {}, {}], &(0x7f0000001540)) 07:54:16 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = geteuid() stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001840)={0x0, 0x0}, &(0x7f0000001880)=0xc) sendmsg$netlink(r2, &(0x7f0000001fc0)={&(0x7f00000002c0)=@proc={0x10, 0x0, 0x25dfdbfd, 0x8280}, 0xc, &(0x7f0000001e80)=[{&(0x7f0000000300)={0x1138, 0x36, 0x200, 0x70bd2d, 0x25dfdbfe, "", [@generic="1c53e8a6f1cdb5ff7be4dc8ec71bedbe2c2fd721fd7fd272577d6af3e5738d412cc426c7320e7b784c685f5154fbcef783af1db492a9deae1602ec0c72cafb1024ac16b2539205ace26ada3ff602c29c4552b97342c3245845edc8620737524aced48855ce003f76776f1b736b704318ac2fef835751a964caf7ecf6e0a2d0f0668cdefb3e23c549112357ee29f54d788fff9822215006bd1f85404b83862055aab50f495aa07ffb662b8ff65d441c0e777f0d27f278799c685c0cfaf347e2d6a105969e75df2e16bc50bba44a0ba8d952fd8eaee947d7d241bc", @generic="b4aee85209072132274dbef659611945c7a6509e7ea518570fba4fc0ff0eb0802e26e4ba4557b641b863dbb2f66698d335d51a6aee1a97a26f47975044d06a05e4469f81b5bc6da79c69d934b528", @generic="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"]}, 0x1138}, {&(0x7f0000001640)={0x134, 0x2d, 0x4, 0x70bd25, 0x25dfdbff, "", [@typed={0x8, 0x48, @uid=r5}, @generic="ccecd26baad47b0427123607ae83ba774c01accde7f5a4eb3c07d51d8f2b76f7dacb81c37ee8feb9a93e7ed566cd25915bd1fb03b2ed0b83943d18120b8c0ec7540993490f341bbea90c30eaae2f59aa013da3c5dec9717861e23b946660cbfbb8e455bc988b246b75634fa6639dd3eccaad11b7d3b21dbeeaad627034e0ae4c583b9eceee555412d2ae11c41f33761f40e39e54802aa3f801d894ced8b48ce35017e9a5946c4f220b00c8bb0c98da208d6c35288dc422", @nested={0x64, 0x2e, [@typed={0x8, 0x62, @str='\x8e!\x00'}, @typed={0x8, 0x5f, @pid=r1}, @generic="1a2a1810efa4fe045f20072d3a33a5d66f0f6880a0ab51991ec30ff8ba0799696ad2a51ae80eb51e4f72376a50b30a3ef3a6", @typed={0x14, 0x3a, @ipv6=@mcast1}, @typed={0x8, 0x5e, @uid=r6}]}]}, 0x134}, {&(0x7f00000018c0)={0x33c, 0x31, 0x0, 0x70bd28, 0x25dfdbfc, "", [@typed={0xc, 0x29, @u64=0x4053}, @generic="2a3f960cac5836828739fe8dfeb92d1ed8b5ca9aeb35e43e076d179368c705bde6dc10a81ec415c5ba31d85c849b7b", @nested={0xf0, 0x94, [@typed={0x4, 0x41}, @generic="0e7eddb333b4e7a8a337f5758802997c7132f86eb85d14ace435e530d3271ec2c2cf50ed434807630c4716cc8c2ebb8af95df9034f8c3b847ef9f73aa00fe20f56e1459a3435cff8e7ac0e128bed506d9595ef8170cf9226e0107e7a8acd7943aec40bfbc125acb2385663c794255e31c387299fa5754da20e7e3e19f2262aae49d0521f82f2f9f6811b7c33968aab85aa209a71f98c4369e2070a84e2e49ecdd25754b043d2058f40bbd254b3d209d8b894682209df84189a387b60e5d60edb78618044f98bd4f52726050a18cf2a40", @typed={0x8, 0x39, @fd=r0}, @typed={0x10, 0x8d, @str='/dev/amidi#\x00'}, @generic]}, @typed={0x8, 0x11, @uid=r7}, @generic="3c22e425f585d87ea13352950304f47af44002d918847c8f02a3873fd64b99301ca5d02991f55a308d20", @nested={0x50, 0x7c, [@generic="87f96ae0afe62df15ed2981d65f01062490e2346a44e5e78ec4662f04168d2073a7a48b47b14903a87c3e8", @typed={0x8, 0x71, @pid=r1}, @typed={0x10, 0x94, @str='/dev/amidi#\x00'}, @typed={0x8, 0x96, @ipv4=@broadcast}]}, @nested={0x17c, 0x12, [@generic="6a036c499a03e99b8020dc549eb7e5b850f60a81610ce31534a02847f2dd58d56bc0be82e8ecee9df6da21c7ea3c5a8cc3d25bc92d82a88c8e25e4df3ef869ffdd31e98c8373e61f1bd44114baa53016ac528177b56db2693620b8c3255bed6842e9fa70be1e785a7b66a245a82ebe3941573b139d27f3f934550cb18ca99bc76b4eaa67aed625b01715addfabcc868c2e79813ebc06375d315a9c8ebd2414530647b00e982e4fdb3741353f93b7db2e48aeff839a83d93d", @typed={0x8, 0x3e, @uid=r8}, @typed={0x8, 0x2e, @u32=0x7}, @typed={0x8, 0x30, @uid=r9}, @generic="587bea8901c017d2c46ad0b4c368af8932fe0437a21993ea95a993acc9a40b4d7aa8d167d91387ecf493af2af6c1358b1de16782e42f9b254401bd6f46261c00e1b66277d117cf9126caa8180a0aed413a51fdb3db8579f5019b4e6bccbf3f5050b11e4b0dbb1e4fb974bb029d61f22e45bcf22dcd764d5e342cd019744e80e752a164601b97b6c12c74943ae3c06821fd48b048353ba3fd4bb5222d7c0aeb02c1bda6f7e4"]}]}, 0x33c}, {&(0x7f0000001c00)={0x150, 0x19, 0x8, 0x70bd2a, 0x25dfdbff, "", [@generic="86b646b66458f642b2d56d67a7cd8bfe917f16574302677993b2b97da10b2dc27c2ef913cf1475a26a0502532dca1d642f7969b3f395cf4bb1b295dc11619d5a1865fcf24bfff77e9d0351aade9196b74e83a666b028340e79f4fa68b60e011f446727e48266f2d023dc6044b99c87026cbaf5939d329f14322db1fba9fe05ce227045a3dd29f228cefa49f2209de71c2be7", @typed={0x8, 0x59, @ipv4=@multicast2}, @generic="ac3dbe474ede6f14762278a20983a5f7a046bb9fad199f3484599d03f47bbac89a067a7516ba64eb540f4d9704b0a80daa24fd2e8d9e3f424f51597479db2967ff2e313ccba921c31820f737e7213a02ae143e1dac5155ad9009497c4495184856bfea213675fb47bd3bb8628d562bc52bb7ce99546eaa5e8c4b4f636117026e38d9a9f82dec7cf3197c26725d86032e39a744bbea004b2c46cf3ff8c3276880d064143d1197"]}, 0x150}, {&(0x7f0000001d80)={0xf8, 0x1b, 0xa00, 0x70bd2a, 0x25dfdbff, "", [@typed={0xb8, 0x15, @binary="c0c9222e7093a1be913100262f428db82f315bc38208f9cbfbc361186cc3ac806c6ed4cd8b99c9f2ac977919d2a52ca722f8a6aef8ee419568c68ea5b1746060e2c905bd09ce414715d1209f72ae95b3350693c7338493c42a07d7a901885ea4b1dfa9ed127e94be20b08ac40d9ccf455c2f660cf769647e661d63b8fce20cc2459f235f678bc3f626728ab3cc604cd8cba10e214c0ce6dd37c35e0448ecb89884d430748e542cb10e3e7d678f17e9300a2f"}, @generic="863224c939ffb6e922df34d1eac8a93caaa27d4988c5ebdf9e285d2e5a34beffee", @typed={0xc, 0x94, @u64=0x3}]}, 0xf8}], 0x5, &(0x7f0000001f00)=[@rights={{0x28, 0x1, 0x1, [r2, r2, r0, r0, r2, r2]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r2, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r2, r0, r2]}}, @rights={{0x1c, 0x1, 0x1, [r2, r2, r0]}}], 0x88, 0x1}, 0x40) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000002000), &(0x7f0000002040)=0x4) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f0000002080)=0x1, 0x4) 07:54:16 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)) geteuid() stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)) sched_yield() 07:54:16 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r1, 0x5d07, 0x5}, 0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000540), &(0x7f0000000580)=0x14) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) io_uring_register$IORING_UNREGISTER_FILES(r3, 0x3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000600)={r1, @in={{0x2, 0x4e22, @loopback}}}, 0x84) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f00000006c0)=0x1) socket$unix(0x1, 0x5, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x113, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000780)={0x4, 0x8, 0xfa00, {r4}}, 0x10) 07:54:16 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)) geteuid() stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)) kcmp(r1, r1, 0x7, r0, 0xffffffffffffff9c) 07:54:16 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r1, 0x5d07, 0x5}, 0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000540), &(0x7f0000000580)=0x14) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) io_uring_register$IORING_UNREGISTER_FILES(r3, 0x3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000600)={r1, @in={{0x2, 0x4e22, @loopback}}}, 0x84) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f00000006c0)=0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r3, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:16 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = geteuid() stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001840)={0x0, 0x0}, &(0x7f0000001880)=0xc) sendmsg$netlink(r2, &(0x7f0000001fc0)={&(0x7f00000002c0)=@proc={0x10, 0x0, 0x25dfdbfd, 0x8280}, 0xc, &(0x7f0000001e80)=[{&(0x7f0000000300)={0x1138, 0x36, 0x200, 0x70bd2d, 0x25dfdbfe, "", [@generic="1c53e8a6f1cdb5ff7be4dc8ec71bedbe2c2fd721fd7fd272577d6af3e5738d412cc426c7320e7b784c685f5154fbcef783af1db492a9deae1602ec0c72cafb1024ac16b2539205ace26ada3ff602c29c4552b97342c3245845edc8620737524aced48855ce003f76776f1b736b704318ac2fef835751a964caf7ecf6e0a2d0f0668cdefb3e23c549112357ee29f54d788fff9822215006bd1f85404b83862055aab50f495aa07ffb662b8ff65d441c0e777f0d27f278799c685c0cfaf347e2d6a105969e75df2e16bc50bba44a0ba8d952fd8eaee947d7d241bc", @generic="b4aee85209072132274dbef659611945c7a6509e7ea518570fba4fc0ff0eb0802e26e4ba4557b641b863dbb2f66698d335d51a6aee1a97a26f47975044d06a05e4469f81b5bc6da79c69d934b528", @generic="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"]}, 0x1138}, {&(0x7f0000001640)={0x134, 0x2d, 0x4, 0x70bd25, 0x25dfdbff, "", [@typed={0x8, 0x48, @uid=r5}, @generic="ccecd26baad47b0427123607ae83ba774c01accde7f5a4eb3c07d51d8f2b76f7dacb81c37ee8feb9a93e7ed566cd25915bd1fb03b2ed0b83943d18120b8c0ec7540993490f341bbea90c30eaae2f59aa013da3c5dec9717861e23b946660cbfbb8e455bc988b246b75634fa6639dd3eccaad11b7d3b21dbeeaad627034e0ae4c583b9eceee555412d2ae11c41f33761f40e39e54802aa3f801d894ced8b48ce35017e9a5946c4f220b00c8bb0c98da208d6c35288dc422", @nested={0x64, 0x2e, [@typed={0x8, 0x62, @str='\x8e!\x00'}, @typed={0x8, 0x5f, @pid=r1}, @generic="1a2a1810efa4fe045f20072d3a33a5d66f0f6880a0ab51991ec30ff8ba0799696ad2a51ae80eb51e4f72376a50b30a3ef3a6", @typed={0x14, 0x3a, @ipv6=@mcast1}, @typed={0x8, 0x5e, @uid=r6}]}]}, 0x134}, {&(0x7f00000018c0)={0x33c, 0x31, 0x0, 0x70bd28, 0x25dfdbfc, "", [@typed={0xc, 0x29, @u64=0x4053}, @generic="2a3f960cac5836828739fe8dfeb92d1ed8b5ca9aeb35e43e076d179368c705bde6dc10a81ec415c5ba31d85c849b7b", @nested={0xf0, 0x94, [@typed={0x4, 0x41}, @generic="0e7eddb333b4e7a8a337f5758802997c7132f86eb85d14ace435e530d3271ec2c2cf50ed434807630c4716cc8c2ebb8af95df9034f8c3b847ef9f73aa00fe20f56e1459a3435cff8e7ac0e128bed506d9595ef8170cf9226e0107e7a8acd7943aec40bfbc125acb2385663c794255e31c387299fa5754da20e7e3e19f2262aae49d0521f82f2f9f6811b7c33968aab85aa209a71f98c4369e2070a84e2e49ecdd25754b043d2058f40bbd254b3d209d8b894682209df84189a387b60e5d60edb78618044f98bd4f52726050a18cf2a40", @typed={0x8, 0x39, @fd=r0}, @typed={0x10, 0x8d, @str='/dev/amidi#\x00'}, @generic]}, @typed={0x8, 0x11, @uid=r7}, @generic="3c22e425f585d87ea13352950304f47af44002d918847c8f02a3873fd64b99301ca5d02991f55a308d20", @nested={0x50, 0x7c, [@generic="87f96ae0afe62df15ed2981d65f01062490e2346a44e5e78ec4662f04168d2073a7a48b47b14903a87c3e8", @typed={0x8, 0x71, @pid=r1}, @typed={0x10, 0x94, @str='/dev/amidi#\x00'}, @typed={0x8, 0x96, @ipv4=@broadcast}]}, @nested={0x17c, 0x12, [@generic="6a036c499a03e99b8020dc549eb7e5b850f60a81610ce31534a02847f2dd58d56bc0be82e8ecee9df6da21c7ea3c5a8cc3d25bc92d82a88c8e25e4df3ef869ffdd31e98c8373e61f1bd44114baa53016ac528177b56db2693620b8c3255bed6842e9fa70be1e785a7b66a245a82ebe3941573b139d27f3f934550cb18ca99bc76b4eaa67aed625b01715addfabcc868c2e79813ebc06375d315a9c8ebd2414530647b00e982e4fdb3741353f93b7db2e48aeff839a83d93d", @typed={0x8, 0x3e, @uid=r8}, @typed={0x8, 0x2e, @u32=0x7}, @typed={0x8, 0x30, @uid=r9}, @generic="587bea8901c017d2c46ad0b4c368af8932fe0437a21993ea95a993acc9a40b4d7aa8d167d91387ecf493af2af6c1358b1de16782e42f9b254401bd6f46261c00e1b66277d117cf9126caa8180a0aed413a51fdb3db8579f5019b4e6bccbf3f5050b11e4b0dbb1e4fb974bb029d61f22e45bcf22dcd764d5e342cd019744e80e752a164601b97b6c12c74943ae3c06821fd48b048353ba3fd4bb5222d7c0aeb02c1bda6f7e4"]}]}, 0x33c}, {&(0x7f0000001c00)={0x150, 0x19, 0x8, 0x70bd2a, 0x25dfdbff, "", [@generic="86b646b66458f642b2d56d67a7cd8bfe917f16574302677993b2b97da10b2dc27c2ef913cf1475a26a0502532dca1d642f7969b3f395cf4bb1b295dc11619d5a1865fcf24bfff77e9d0351aade9196b74e83a666b028340e79f4fa68b60e011f446727e48266f2d023dc6044b99c87026cbaf5939d329f14322db1fba9fe05ce227045a3dd29f228cefa49f2209de71c2be7", @typed={0x8, 0x59, @ipv4=@multicast2}, @generic="ac3dbe474ede6f14762278a20983a5f7a046bb9fad199f3484599d03f47bbac89a067a7516ba64eb540f4d9704b0a80daa24fd2e8d9e3f424f51597479db2967ff2e313ccba921c31820f737e7213a02ae143e1dac5155ad9009497c4495184856bfea213675fb47bd3bb8628d562bc52bb7ce99546eaa5e8c4b4f636117026e38d9a9f82dec7cf3197c26725d86032e39a744bbea004b2c46cf3ff8c3276880d064143d1197"]}, 0x150}, {&(0x7f0000001d80)={0xf8, 0x1b, 0xa00, 0x70bd2a, 0x25dfdbff, "", [@typed={0xb8, 0x15, @binary="c0c9222e7093a1be913100262f428db82f315bc38208f9cbfbc361186cc3ac806c6ed4cd8b99c9f2ac977919d2a52ca722f8a6aef8ee419568c68ea5b1746060e2c905bd09ce414715d1209f72ae95b3350693c7338493c42a07d7a901885ea4b1dfa9ed127e94be20b08ac40d9ccf455c2f660cf769647e661d63b8fce20cc2459f235f678bc3f626728ab3cc604cd8cba10e214c0ce6dd37c35e0448ecb89884d430748e542cb10e3e7d678f17e9300a2f"}, @generic="863224c939ffb6e922df34d1eac8a93caaa27d4988c5ebdf9e285d2e5a34beffee", @typed={0xc, 0x94, @u64=0x3}]}, 0xf8}], 0x5, &(0x7f0000001f00)=[@rights={{0x28, 0x1, 0x1, [r2, r2, r0, r0, r2, r2]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r2, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r2, r0, r2]}}, @rights={{0x1c, 0x1, 0x1, [r2, r2, r0]}}], 0x88, 0x1}, 0x40) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000002000), &(0x7f0000002040)=0x4) 07:54:16 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)) geteuid() sched_yield() 07:54:16 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)) geteuid() kcmp(r1, r1, 0x7, r0, 0xffffffffffffff9c) 07:54:16 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000080)={0x3e, &(0x7f0000000040)=""/62}) pread64(r0, &(0x7f00000000c0)=""/4096, 0x1000, 0x0) sendto$rxrpc(r0, &(0x7f00000010c0)="01e8dce1faf9e2880d42a5f69f436a8dd04a628a167af0140aee65d16dfdfe8d2d0b8a6a5cc139941dc22ad75a0fb526e31910c09e503a9bbc8dec9ac1f36d1afed38e53750c4421ef50e86611498bcd0fa984630d365e127f5c3a65e7a6cbd0c30e2970d7bae8fbf07d9dd474fa9abe13fa19481d011779ecbce45fd8f57a12844bbcc3275fe7ba65ef5e8cfab8998003ff2813a604b889f9e951f78a8d769869f08ffe816ae6d0eb412bdf93133364bc849925f4ebc4f4bbe3650175962f49104915f017b1d387954ef6ee69b2fdd4cc67058f0e2840eb48bae782e3a94b8677b0bd318cdb2830", 0xe8, 0x4000000, 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f00000011c0)={0x3, 0x3}) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f0000001200)=""/130) getresuid(&(0x7f00000012c0), &(0x7f0000001300)=0x0, &(0x7f0000001340)) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000001380)={0x3, @null, r2}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000008, 0x1010, r1, 0x0) io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x3c4}) io_setup(0x1ff, &(0x7f0000001440)) 07:54:17 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = geteuid() stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001840)={0x0, 0x0}, &(0x7f0000001880)=0xc) sendmsg$netlink(r2, &(0x7f0000001fc0)={&(0x7f00000002c0)=@proc={0x10, 0x0, 0x25dfdbfd, 0x8280}, 0xc, &(0x7f0000001e80)=[{&(0x7f0000000300)={0x1138, 0x36, 0x200, 0x70bd2d, 0x25dfdbfe, "", [@generic="1c53e8a6f1cdb5ff7be4dc8ec71bedbe2c2fd721fd7fd272577d6af3e5738d412cc426c7320e7b784c685f5154fbcef783af1db492a9deae1602ec0c72cafb1024ac16b2539205ace26ada3ff602c29c4552b97342c3245845edc8620737524aced48855ce003f76776f1b736b704318ac2fef835751a964caf7ecf6e0a2d0f0668cdefb3e23c549112357ee29f54d788fff9822215006bd1f85404b83862055aab50f495aa07ffb662b8ff65d441c0e777f0d27f278799c685c0cfaf347e2d6a105969e75df2e16bc50bba44a0ba8d952fd8eaee947d7d241bc", @generic="b4aee85209072132274dbef659611945c7a6509e7ea518570fba4fc0ff0eb0802e26e4ba4557b641b863dbb2f66698d335d51a6aee1a97a26f47975044d06a05e4469f81b5bc6da79c69d934b528", @generic="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"]}, 0x1138}, {&(0x7f0000001640)={0x134, 0x2d, 0x4, 0x70bd25, 0x25dfdbff, "", [@typed={0x8, 0x48, @uid=r5}, @generic="ccecd26baad47b0427123607ae83ba774c01accde7f5a4eb3c07d51d8f2b76f7dacb81c37ee8feb9a93e7ed566cd25915bd1fb03b2ed0b83943d18120b8c0ec7540993490f341bbea90c30eaae2f59aa013da3c5dec9717861e23b946660cbfbb8e455bc988b246b75634fa6639dd3eccaad11b7d3b21dbeeaad627034e0ae4c583b9eceee555412d2ae11c41f33761f40e39e54802aa3f801d894ced8b48ce35017e9a5946c4f220b00c8bb0c98da208d6c35288dc422", @nested={0x64, 0x2e, [@typed={0x8, 0x62, @str='\x8e!\x00'}, @typed={0x8, 0x5f, @pid=r1}, @generic="1a2a1810efa4fe045f20072d3a33a5d66f0f6880a0ab51991ec30ff8ba0799696ad2a51ae80eb51e4f72376a50b30a3ef3a6", @typed={0x14, 0x3a, @ipv6=@mcast1}, @typed={0x8, 0x5e, @uid=r6}]}]}, 0x134}, {&(0x7f00000018c0)={0x33c, 0x31, 0x0, 0x70bd28, 0x25dfdbfc, "", [@typed={0xc, 0x29, @u64=0x4053}, @generic="2a3f960cac5836828739fe8dfeb92d1ed8b5ca9aeb35e43e076d179368c705bde6dc10a81ec415c5ba31d85c849b7b", @nested={0xf0, 0x94, [@typed={0x4, 0x41}, @generic="0e7eddb333b4e7a8a337f5758802997c7132f86eb85d14ace435e530d3271ec2c2cf50ed434807630c4716cc8c2ebb8af95df9034f8c3b847ef9f73aa00fe20f56e1459a3435cff8e7ac0e128bed506d9595ef8170cf9226e0107e7a8acd7943aec40bfbc125acb2385663c794255e31c387299fa5754da20e7e3e19f2262aae49d0521f82f2f9f6811b7c33968aab85aa209a71f98c4369e2070a84e2e49ecdd25754b043d2058f40bbd254b3d209d8b894682209df84189a387b60e5d60edb78618044f98bd4f52726050a18cf2a40", @typed={0x8, 0x39, @fd=r0}, @typed={0x10, 0x8d, @str='/dev/amidi#\x00'}, @generic]}, @typed={0x8, 0x11, @uid=r7}, @generic="3c22e425f585d87ea13352950304f47af44002d918847c8f02a3873fd64b99301ca5d02991f55a308d20", @nested={0x50, 0x7c, [@generic="87f96ae0afe62df15ed2981d65f01062490e2346a44e5e78ec4662f04168d2073a7a48b47b14903a87c3e8", @typed={0x8, 0x71, @pid=r1}, @typed={0x10, 0x94, @str='/dev/amidi#\x00'}, @typed={0x8, 0x96, @ipv4=@broadcast}]}, @nested={0x17c, 0x12, [@generic="6a036c499a03e99b8020dc549eb7e5b850f60a81610ce31534a02847f2dd58d56bc0be82e8ecee9df6da21c7ea3c5a8cc3d25bc92d82a88c8e25e4df3ef869ffdd31e98c8373e61f1bd44114baa53016ac528177b56db2693620b8c3255bed6842e9fa70be1e785a7b66a245a82ebe3941573b139d27f3f934550cb18ca99bc76b4eaa67aed625b01715addfabcc868c2e79813ebc06375d315a9c8ebd2414530647b00e982e4fdb3741353f93b7db2e48aeff839a83d93d", @typed={0x8, 0x3e, @uid=r8}, @typed={0x8, 0x2e, @u32=0x7}, @typed={0x8, 0x30, @uid=r9}, @generic="587bea8901c017d2c46ad0b4c368af8932fe0437a21993ea95a993acc9a40b4d7aa8d167d91387ecf493af2af6c1358b1de16782e42f9b254401bd6f46261c00e1b66277d117cf9126caa8180a0aed413a51fdb3db8579f5019b4e6bccbf3f5050b11e4b0dbb1e4fb974bb029d61f22e45bcf22dcd764d5e342cd019744e80e752a164601b97b6c12c74943ae3c06821fd48b048353ba3fd4bb5222d7c0aeb02c1bda6f7e4"]}]}, 0x33c}, {&(0x7f0000001c00)={0x150, 0x19, 0x8, 0x70bd2a, 0x25dfdbff, "", [@generic="86b646b66458f642b2d56d67a7cd8bfe917f16574302677993b2b97da10b2dc27c2ef913cf1475a26a0502532dca1d642f7969b3f395cf4bb1b295dc11619d5a1865fcf24bfff77e9d0351aade9196b74e83a666b028340e79f4fa68b60e011f446727e48266f2d023dc6044b99c87026cbaf5939d329f14322db1fba9fe05ce227045a3dd29f228cefa49f2209de71c2be7", @typed={0x8, 0x59, @ipv4=@multicast2}, @generic="ac3dbe474ede6f14762278a20983a5f7a046bb9fad199f3484599d03f47bbac89a067a7516ba64eb540f4d9704b0a80daa24fd2e8d9e3f424f51597479db2967ff2e313ccba921c31820f737e7213a02ae143e1dac5155ad9009497c4495184856bfea213675fb47bd3bb8628d562bc52bb7ce99546eaa5e8c4b4f636117026e38d9a9f82dec7cf3197c26725d86032e39a744bbea004b2c46cf3ff8c3276880d064143d1197"]}, 0x150}, {&(0x7f0000001d80)={0xf8, 0x1b, 0xa00, 0x70bd2a, 0x25dfdbff, "", [@typed={0xb8, 0x15, @binary="c0c9222e7093a1be913100262f428db82f315bc38208f9cbfbc361186cc3ac806c6ed4cd8b99c9f2ac977919d2a52ca722f8a6aef8ee419568c68ea5b1746060e2c905bd09ce414715d1209f72ae95b3350693c7338493c42a07d7a901885ea4b1dfa9ed127e94be20b08ac40d9ccf455c2f660cf769647e661d63b8fce20cc2459f235f678bc3f626728ab3cc604cd8cba10e214c0ce6dd37c35e0448ecb89884d430748e542cb10e3e7d678f17e9300a2f"}, @generic="863224c939ffb6e922df34d1eac8a93caaa27d4988c5ebdf9e285d2e5a34beffee", @typed={0xc, 0x94, @u64=0x3}]}, 0xf8}], 0x5, &(0x7f0000001f00)=[@rights={{0x28, 0x1, 0x1, [r2, r2, r0, r0, r2, r2]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r2, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r2, r0, r2]}}, @rights={{0x1c, 0x1, 0x1, [r2, r2, r0]}}], 0x88, 0x1}, 0x40) 07:54:17 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r1, 0x5d07, 0x5}, 0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000540), &(0x7f0000000580)=0x14) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) io_uring_register$IORING_UNREGISTER_FILES(r3, 0x3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000600)={r1, @in={{0x2, 0x4e22, @loopback}}}, 0x84) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f00000006c0)=0x1) socket$unix(0x1, 0x5, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) 07:54:17 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r1, 0x5d07, 0x5}, 0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000540), &(0x7f0000000580)=0x14) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) io_uring_register$IORING_UNREGISTER_FILES(r3, 0x3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000600)={r1, @in={{0x2, 0x4e22, @loopback}}}, 0x84) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r3, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:17 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)) sched_yield() 07:54:17 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r1, 0x5d07, 0x5}, 0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000540), &(0x7f0000000580)=0x14) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) io_uring_register$IORING_UNREGISTER_FILES(r3, 0x3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000600)={r1, @in={{0x2, 0x4e22, @loopback}}}, 0x84) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f00000006c0)=0x1) socket$unix(0x1, 0x5, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) 07:54:17 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)) kcmp(r1, r1, 0x7, r0, 0xffffffffffffff9c) 07:54:17 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)) geteuid() stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001840), &(0x7f0000001880)=0xc) 07:54:17 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) sched_yield() 07:54:17 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r1, 0x5d07, 0x5}, 0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000540), &(0x7f0000000580)=0x14) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r2, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:17 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000080)={0x3e, &(0x7f0000000040)=""/62}) pread64(r0, &(0x7f00000000c0)=""/4096, 0x1000, 0x0) sendto$rxrpc(r0, &(0x7f00000010c0)="01e8dce1faf9e2880d42a5f69f436a8dd04a628a167af0140aee65d16dfdfe8d2d0b8a6a5cc139941dc22ad75a0fb526e31910c09e503a9bbc8dec9ac1f36d1afed38e53750c4421ef50e86611498bcd0fa984630d365e127f5c3a65e7a6cbd0c30e2970d7bae8fbf07d9dd474fa9abe13fa19481d011779ecbce45fd8f57a12844bbcc3275fe7ba65ef5e8cfab8998003ff2813a604b889f9e951f78a8d769869f08ffe816ae6d0eb412bdf93133364bc849925f4ebc4f4bbe3650175962f49104915f017b1d387954ef6ee69b2fdd4cc67058f0e2840eb48bae782e3a94b8677b0bd318cdb2830", 0xe8, 0x4000000, 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f00000011c0)={0x3, 0x3}) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f0000001200)=""/130) getresuid(&(0x7f00000012c0), &(0x7f0000001300)=0x0, &(0x7f0000001340)) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000001380)={0x3, @null, r2}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000008, 0x1010, r1, 0x0) io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x3c4}) 07:54:17 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) kcmp(r1, r1, 0x7, r0, 0xffffffffffffff9c) 07:54:17 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r1, 0x5d07, 0x5}, 0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000540), &(0x7f0000000580)=0x14) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) io_uring_register$IORING_UNREGISTER_FILES(r3, 0x3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000600)={r1, @in={{0x2, 0x4e22, @loopback}}}, 0x84) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f00000006c0)=0x1) socket$unix(0x1, 0x5, 0x0) 07:54:17 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r1, 0x5d07, 0x5}, 0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000540), &(0x7f0000000580)=0x14) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r2, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:17 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)) geteuid() stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)) 07:54:17 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) sched_yield() 07:54:17 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000080)={0x3e, &(0x7f0000000040)=""/62}) pread64(r0, &(0x7f00000000c0)=""/4096, 0x1000, 0x0) sendto$rxrpc(r0, &(0x7f00000010c0)="01e8dce1faf9e2880d42a5f69f436a8dd04a628a167af0140aee65d16dfdfe8d2d0b8a6a5cc139941dc22ad75a0fb526e31910c09e503a9bbc8dec9ac1f36d1afed38e53750c4421ef50e86611498bcd0fa984630d365e127f5c3a65e7a6cbd0c30e2970d7bae8fbf07d9dd474fa9abe13fa19481d011779ecbce45fd8f57a12844bbcc3275fe7ba65ef5e8cfab8998003ff2813a604b889f9e951f78a8d769869f08ffe816ae6d0eb412bdf93133364bc849925f4ebc4f4bbe3650175962f49104915f017b1d387954ef6ee69b2fdd4cc67058f0e2840eb48bae782e3a94b8677b0bd318cdb2830", 0xe8, 0x4000000, 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f00000011c0)={0x3, 0x3}) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f0000001200)=""/130) getresuid(&(0x7f00000012c0), &(0x7f0000001300)=0x0, &(0x7f0000001340)) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000001380)={0x3, @null, r2}) io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x3c4}) 07:54:17 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) kcmp(r1, r1, 0x7, r0, 0xffffffffffffff9c) 07:54:17 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r1, 0x5d07, 0x5}, 0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000540), &(0x7f0000000580)=0x14) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:17 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r1, 0x5d07, 0x5}, 0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000540), &(0x7f0000000580)=0x14) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) io_uring_register$IORING_UNREGISTER_FILES(r3, 0x3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000600)={r1, @in={{0x2, 0x4e22, @loopback}}}, 0x84) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f00000006c0)=0x1) 07:54:17 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)) geteuid() 07:54:17 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) sched_yield() 07:54:18 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) kcmp(r1, r1, 0x7, r0, 0xffffffffffffff9c) 07:54:18 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r1, 0x5d07, 0x5}, 0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000540), &(0x7f0000000580)=0x14) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:18 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000080)={0x3e, &(0x7f0000000040)=""/62}) pread64(r0, &(0x7f00000000c0)=""/4096, 0x1000, 0x0) sendto$rxrpc(r0, &(0x7f00000010c0)="01e8dce1faf9e2880d42a5f69f436a8dd04a628a167af0140aee65d16dfdfe8d2d0b8a6a5cc139941dc22ad75a0fb526e31910c09e503a9bbc8dec9ac1f36d1afed38e53750c4421ef50e86611498bcd0fa984630d365e127f5c3a65e7a6cbd0c30e2970d7bae8fbf07d9dd474fa9abe13fa19481d011779ecbce45fd8f57a12844bbcc3275fe7ba65ef5e8cfab8998003ff2813a604b889f9e951f78a8d769869f08ffe816ae6d0eb412bdf93133364bc849925f4ebc4f4bbe3650175962f49104915f017b1d387954ef6ee69b2fdd4cc67058f0e2840eb48bae782e3a94b8677b0bd318cdb2830", 0xe8, 0x4000000, 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f00000011c0)={0x3, 0x3}) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f0000001200)=""/130) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x3c4}) 07:54:18 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r1, 0x5d07, 0x5}, 0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000540), &(0x7f0000000580)=0x14) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) io_uring_register$IORING_UNREGISTER_FILES(r3, 0x3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000600)={r1, @in={{0x2, 0x4e22, @loopback}}}, 0x84) 07:54:18 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) sched_yield() 07:54:18 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)) 07:54:18 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) kcmp(r1, r1, 0x7, r0, 0xffffffffffffff9c) 07:54:18 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r1, 0x5d07, 0x5}, 0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000540), &(0x7f0000000580)=0x14) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:18 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000080)={0x3e, &(0x7f0000000040)=""/62}) pread64(r0, &(0x7f00000000c0)=""/4096, 0x1000, 0x0) sendto$rxrpc(r0, &(0x7f00000010c0)="01e8dce1faf9e2880d42a5f69f436a8dd04a628a167af0140aee65d16dfdfe8d2d0b8a6a5cc139941dc22ad75a0fb526e31910c09e503a9bbc8dec9ac1f36d1afed38e53750c4421ef50e86611498bcd0fa984630d365e127f5c3a65e7a6cbd0c30e2970d7bae8fbf07d9dd474fa9abe13fa19481d011779ecbce45fd8f57a12844bbcc3275fe7ba65ef5e8cfab8998003ff2813a604b889f9e951f78a8d769869f08ffe816ae6d0eb412bdf93133364bc849925f4ebc4f4bbe3650175962f49104915f017b1d387954ef6ee69b2fdd4cc67058f0e2840eb48bae782e3a94b8677b0bd318cdb2830", 0xe8, 0x4000000, 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f00000011c0)={0x3, 0x3}) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f0000001200)=""/130) io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x3c4}) 07:54:18 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00'}) sched_yield() 07:54:18 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r1, 0x5d07, 0x5}, 0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000540), &(0x7f0000000580)=0x14) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) 07:54:18 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) 07:54:18 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00'}) kcmp(r1, r1, 0x7, r0, 0xffffffffffffff9c) 07:54:18 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sched_yield() 07:54:18 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r1, 0x5d07, 0x5}, 0x8) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r2, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:18 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000080)={0x3e, &(0x7f0000000040)=""/62}) pread64(r0, &(0x7f00000000c0)=""/4096, 0x1000, 0x0) sendto$rxrpc(r0, &(0x7f00000010c0)="01e8dce1faf9e2880d42a5f69f436a8dd04a628a167af0140aee65d16dfdfe8d2d0b8a6a5cc139941dc22ad75a0fb526e31910c09e503a9bbc8dec9ac1f36d1afed38e53750c4421ef50e86611498bcd0fa984630d365e127f5c3a65e7a6cbd0c30e2970d7bae8fbf07d9dd474fa9abe13fa19481d011779ecbce45fd8f57a12844bbcc3275fe7ba65ef5e8cfab8998003ff2813a604b889f9e951f78a8d769869f08ffe816ae6d0eb412bdf93133364bc849925f4ebc4f4bbe3650175962f49104915f017b1d387954ef6ee69b2fdd4cc67058f0e2840eb48bae782e3a94b8677b0bd318cdb2830", 0xe8, 0x4000000, 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f00000011c0)={0x3, 0x3}) io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x3c4}) 07:54:18 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r1, 0x5d07, 0x5}, 0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000540), &(0x7f0000000580)=0x14) pipe2(&(0x7f00000005c0), 0x800) 07:54:18 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') kcmp(r1, r1, 0x7, r0, 0xffffffffffffff9c) 07:54:18 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) 07:54:18 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r1, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:18 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000080)={0x3e, &(0x7f0000000040)=""/62}) pread64(r0, &(0x7f00000000c0)=""/4096, 0x1000, 0x0) sendto$rxrpc(r0, &(0x7f00000010c0)="01e8dce1faf9e2880d42a5f69f436a8dd04a628a167af0140aee65d16dfdfe8d2d0b8a6a5cc139941dc22ad75a0fb526e31910c09e503a9bbc8dec9ac1f36d1afed38e53750c4421ef50e86611498bcd0fa984630d365e127f5c3a65e7a6cbd0c30e2970d7bae8fbf07d9dd474fa9abe13fa19481d011779ecbce45fd8f57a12844bbcc3275fe7ba65ef5e8cfab8998003ff2813a604b889f9e951f78a8d769869f08ffe816ae6d0eb412bdf93133364bc849925f4ebc4f4bbe3650175962f49104915f017b1d387954ef6ee69b2fdd4cc67058f0e2840eb48bae782e3a94b8677b0bd318cdb2830", 0xe8, 0x4000000, 0x0, 0x0) io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x3c4}) 07:54:18 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) sched_yield() 07:54:18 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r1, 0x5d07, 0x5}, 0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000540), &(0x7f0000000580)=0x14) 07:54:19 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) 07:54:19 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) kcmp(r1, r1, 0x7, r0, 0xffffffffffffff9c) 07:54:19 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) sched_yield() 07:54:19 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r1, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:19 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000080)={0x3e, &(0x7f0000000040)=""/62}) pread64(r0, &(0x7f00000000c0)=""/4096, 0x1000, 0x0) io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x3c4}) 07:54:19 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r1, 0x5d07, 0x5}, 0x8) 07:54:19 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) 07:54:19 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) kcmp(r1, r1, 0x7, r0, 0xffffffffffffff9c) 07:54:19 executing program 3: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) getpgid(0x0) sched_yield() 07:54:19 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r1, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:19 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) 07:54:19 executing program 3: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) sched_yield() 07:54:19 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) kcmp(r1, r1, 0x7, r0, 0xffffffffffffff9c) 07:54:19 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000080)={0x3e, &(0x7f0000000040)=""/62}) io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x3c4}) 07:54:19 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) kcmp(0x0, 0x0, 0x7, r0, 0xffffffffffffff9c) 07:54:19 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) 07:54:19 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r1, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:19 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) 07:54:19 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) kcmp(0x0, 0x0, 0x7, r0, 0xffffffffffffff9c) 07:54:19 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00'}) 07:54:19 executing program 3: sched_yield() 07:54:19 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r1, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:19 executing program 0: pipe(&(0x7f0000000000)) io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x3c4}) 07:54:19 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) 07:54:19 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) kcmp(0x0, 0x0, 0x7, r0, 0xffffffffffffff9c) 07:54:20 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r1, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:20 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x3c4}) 07:54:20 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) 07:54:20 executing program 4: r0 = getpgid(0x0) kcmp(r0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:20 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') 07:54:20 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)) kcmp(r1, r1, 0x7, r0, 0xffffffffffffff9c) 07:54:20 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r1, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:20 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)) kcmp(r1, r1, 0x7, r0, 0xffffffffffffff9c) 07:54:20 executing program 0: io_uring_setup(0x0, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x3c4}) 07:54:20 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) 07:54:20 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) 07:54:20 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:20 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) 07:54:20 executing program 0: io_uring_setup(0x0, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x3c4}) 07:54:20 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:20 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) 07:54:20 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)) kcmp(r1, r1, 0x7, r0, 0xffffffffffffff9c) 07:54:20 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r1, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:20 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3}) 07:54:20 executing program 0: io_uring_setup(0x0, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x3c4}) 07:54:20 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) 07:54:20 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) kcmp(r1, r1, 0x7, r0, 0xffffffffffffff9c) 07:54:20 executing program 1: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:20 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:21 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) kcmp(r1, r1, 0x7, r0, 0xffffffffffffff9c) 07:54:21 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:21 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) 07:54:21 executing program 0: io_uring_setup(0x8a8, 0x0) 07:54:21 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:21 executing program 5: fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:21 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:21 executing program 0: io_uring_setup(0x8a8, 0x0) 07:54:21 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) kcmp(r1, r1, 0x7, r0, 0xffffffffffffff9c) 07:54:21 executing program 1: pipe2(0x0, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:21 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) 07:54:21 executing program 5: fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:21 executing program 5: fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:21 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) kcmp(r1, r1, 0x7, r0, 0xffffffffffffff9c) 07:54:21 executing program 0: io_uring_setup(0x8a8, 0x0) 07:54:21 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) 07:54:21 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00'}) kcmp(r1, r1, 0x7, r0, 0xffffffffffffff9c) 07:54:21 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x3c4}) 07:54:21 executing program 2: fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:21 executing program 5: r0 = syz_open_dev$evdev(0x0, 0xfffffffffffffff7, 0x1c9040) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3}) 07:54:21 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:21 executing program 1: pipe2(0x0, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:21 executing program 5: r0 = syz_open_dev$evdev(0x0, 0xfffffffffffffff7, 0x1c9040) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3}) 07:54:21 executing program 1: pipe2(0x0, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:21 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:21 executing program 2: fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:22 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') kcmp(r1, r1, 0x7, r0, 0xffffffffffffff9c) 07:54:22 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x3c4}) 07:54:22 executing program 5: r0 = syz_open_dev$evdev(0x0, 0xfffffffffffffff7, 0x1c9040) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3}) 07:54:22 executing program 2: fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:22 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:22 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x3c4}) 07:54:22 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) kcmp(r1, r1, 0x7, r0, 0xffffffffffffff9c) 07:54:22 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:22 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x40, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) 07:54:22 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x1c9040) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3}) 07:54:22 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:22 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x40, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) 07:54:22 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:22 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:22 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7}) 07:54:22 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) kcmp(r1, r1, 0x7, r0, 0xffffffffffffff9c) 07:54:22 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3}) 07:54:22 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x40, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) 07:54:22 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) kcmp(r1, r1, 0x7, r0, 0xffffffffffffff9c) 07:54:22 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:22 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:22 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r1, 0x5d07, 0x5}, 0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000540), &(0x7f0000000580)=0x14) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) io_uring_register$IORING_UNREGISTER_FILES(r3, 0x3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000600)={r1, @in={{0x2, 0x4e22, @loopback}}}, 0x84) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f00000006c0)=0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r3, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:22 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) 07:54:22 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:22 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:22 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) kcmp(0x0, 0x0, 0x7, r0, 0xffffffffffffff9c) 07:54:23 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:23 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:23 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) 07:54:23 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) kcmp(0x0, 0x0, 0x7, r0, 0xffffffffffffff9c) 07:54:23 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:23 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:23 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r1, 0x5d07, 0x5}, 0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000540), &(0x7f0000000580)=0x14) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) io_uring_register$IORING_UNREGISTER_FILES(r3, 0x3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000600)={r1, @in={{0x2, 0x4e22, @loopback}}}, 0x84) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f00000006c0)=0x1) socket$unix(0x1, 0x5, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x113, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000780)={0x4, 0x8, 0xfa00, {r4}}, 0x10) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000007c0)=@int=0x5, 0x4) ioctl$CAPI_INSTALLED(r0, 0x80024322) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000840)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f0000000a00)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000009c0)={&(0x7f0000000880)={0x120, r5, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xd7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x401}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x401}]}, @TIPC_NLA_MEDIA={0x68, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x800}, 0xbd015ee0a4ec138f) openat$rtc(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/rtc0\x00', 0x2000, 0x0) 07:54:23 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:23 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:23 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) kcmp(0x0, 0x0, 0x7, r0, 0xffffffffffffff9c) 07:54:23 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:23 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:23 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:23 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:23 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000080)={0x3e, &(0x7f0000000040)=""/62}) pread64(r0, &(0x7f00000000c0)=""/4096, 0x1000, 0x0) sendto$rxrpc(r0, &(0x7f00000010c0)="01e8dce1faf9e2880d42a5f69f436a8dd04a628a167af0140aee65d16dfdfe8d2d0b8a6a5cc139941dc22ad75a0fb526e31910c09e503a9bbc8dec9ac1f36d1afed38e53750c4421ef50e86611498bcd0fa984630d365e127f5c3a65e7a6cbd0c30e2970d7bae8fbf07d9dd474fa9abe13fa19481d011779ecbce45fd8f57a12844bbcc3275fe7ba65ef5e8cfab8998003ff2813a604b889f9e951f78a8d769869f08ffe816ae6d0eb412bdf93133364bc849925f4ebc4f4bbe3650175962f49104915f017b1d387954ef6ee69b2fdd4cc67058f0e2840eb48bae782e3a94b8677b0bd318cdb2830", 0xe8, 0x4000000, 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f00000011c0)={0x3, 0x3}) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f0000001200)=""/130) getresuid(&(0x7f00000012c0), &(0x7f0000001300)=0x0, &(0x7f0000001340)) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000001380)={0x3, @null, r2}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000008, 0x1010, r1, 0x0) io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x3c4}) io_setup(0x1ff, &(0x7f0000001440)=0x0) io_getevents(r3, 0x4d, 0x6, &(0x7f0000001480)=[{}, {}, {}, {}, {}, {}], &(0x7f0000001540)) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000001580)={{0x2, 0x4e21, @rand_addr=0x80000000}, {}, 0x2, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'rose0\x00'}) io_getevents(r3, 0x80000000, 0x1, &(0x7f0000001600)=[{}], &(0x7f0000001640)={0x77359400}) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000001680)) write$FUSE_INIT(r0, &(0x7f00000016c0)={0x50, 0x0, 0x2, {0x7, 0x1f, 0x6, 0x2, 0x7f9, 0x1f, 0x7, 0x1}}, 0x50) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000001740)={0x0, 0x7fff}, &(0x7f0000001780)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000017c0)={r4, @in6={{0xa, 0x4e22, 0x1, @mcast1, 0x4}}, 0x4, 0x579bf2b2}, 0x90) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001880)='/dev/cachefiles\x00', 0x400000, 0x0) write$UHID_SET_REPORT_REPLY(r1, &(0x7f00000018c0)={0xe, 0xa, 0x12000000000000, 0x1f, 0x78, "372519c98ac6df31c06f121289547d56b860cae82969370982060f8cce4049a0194092d3372b18027155a92de5e53dabca4958f3199a16c7c7475e2cc8e625be35cf95b2304ea140042922c6686ee9d9b535e252733dfdb25e1fc4d00b9a10f74959c0208ba74587c3dbd7c60e06f362bfd2097d80b61bfc"}, 0x84) 07:54:23 executing program 3: r0 = getpgid(0x0) kcmp(r0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:23 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:23 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:23 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:23 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:23 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:23 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:24 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:24 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:24 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:24 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:24 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x1c9040) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x700, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001440)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = geteuid() stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001840)={0x0, 0x0}, &(0x7f0000001880)=0xc) sendmsg$netlink(r2, &(0x7f0000001fc0)={&(0x7f00000002c0)=@proc={0x10, 0x0, 0x25dfdbfd, 0x8280}, 0xc, &(0x7f0000001e80)=[{&(0x7f0000000300)={0x1138, 0x36, 0x200, 0x70bd2d, 0x25dfdbfe, "", [@generic="1c53e8a6f1cdb5ff7be4dc8ec71bedbe2c2fd721fd7fd272577d6af3e5738d412cc426c7320e7b784c685f5154fbcef783af1db492a9deae1602ec0c72cafb1024ac16b2539205ace26ada3ff602c29c4552b97342c3245845edc8620737524aced48855ce003f76776f1b736b704318ac2fef835751a964caf7ecf6e0a2d0f0668cdefb3e23c549112357ee29f54d788fff9822215006bd1f85404b83862055aab50f495aa07ffb662b8ff65d441c0e777f0d27f278799c685c0cfaf347e2d6a105969e75df2e16bc50bba44a0ba8d952fd8eaee947d7d241bc", @generic="b4aee85209072132274dbef659611945c7a6509e7ea518570fba4fc0ff0eb0802e26e4ba4557b641b863dbb2f66698d335d51a6aee1a97a26f47975044d06a05e4469f81b5bc6da79c69d934b528", @generic="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"]}, 0x1138}, {&(0x7f0000001640)={0x134, 0x2d, 0x4, 0x70bd25, 0x25dfdbff, "", [@typed={0x8, 0x48, @uid=r5}, @generic="ccecd26baad47b0427123607ae83ba774c01accde7f5a4eb3c07d51d8f2b76f7dacb81c37ee8feb9a93e7ed566cd25915bd1fb03b2ed0b83943d18120b8c0ec7540993490f341bbea90c30eaae2f59aa013da3c5dec9717861e23b946660cbfbb8e455bc988b246b75634fa6639dd3eccaad11b7d3b21dbeeaad627034e0ae4c583b9eceee555412d2ae11c41f33761f40e39e54802aa3f801d894ced8b48ce35017e9a5946c4f220b00c8bb0c98da208d6c35288dc422", @nested={0x64, 0x2e, [@typed={0x8, 0x62, @str='\x8e!\x00'}, @typed={0x8, 0x5f, @pid=r1}, @generic="1a2a1810efa4fe045f20072d3a33a5d66f0f6880a0ab51991ec30ff8ba0799696ad2a51ae80eb51e4f72376a50b30a3ef3a6", @typed={0x14, 0x3a, @ipv6=@mcast1}, @typed={0x8, 0x5e, @uid=r6}]}]}, 0x134}, {&(0x7f00000018c0)={0x33c, 0x31, 0x0, 0x70bd28, 0x25dfdbfc, "", [@typed={0xc, 0x29, @u64=0x4053}, @generic="2a3f960cac5836828739fe8dfeb92d1ed8b5ca9aeb35e43e076d179368c705bde6dc10a81ec415c5ba31d85c849b7b", @nested={0xf0, 0x94, [@typed={0x4, 0x41}, @generic="0e7eddb333b4e7a8a337f5758802997c7132f86eb85d14ace435e530d3271ec2c2cf50ed434807630c4716cc8c2ebb8af95df9034f8c3b847ef9f73aa00fe20f56e1459a3435cff8e7ac0e128bed506d9595ef8170cf9226e0107e7a8acd7943aec40bfbc125acb2385663c794255e31c387299fa5754da20e7e3e19f2262aae49d0521f82f2f9f6811b7c33968aab85aa209a71f98c4369e2070a84e2e49ecdd25754b043d2058f40bbd254b3d209d8b894682209df84189a387b60e5d60edb78618044f98bd4f52726050a18cf2a40", @typed={0x8, 0x39, @fd=r0}, @typed={0x10, 0x8d, @str='/dev/amidi#\x00'}, @generic]}, @typed={0x8, 0x11, @uid=r7}, @generic="3c22e425f585d87ea13352950304f47af44002d918847c8f02a3873fd64b99301ca5d02991f55a308d20", @nested={0x50, 0x7c, [@generic="87f96ae0afe62df15ed2981d65f01062490e2346a44e5e78ec4662f04168d2073a7a48b47b14903a87c3e8", @typed={0x8, 0x71, @pid=r1}, @typed={0x10, 0x94, @str='/dev/amidi#\x00'}, @typed={0x8, 0x96, @ipv4=@broadcast}]}, @nested={0x17c, 0x12, [@generic="6a036c499a03e99b8020dc549eb7e5b850f60a81610ce31534a02847f2dd58d56bc0be82e8ecee9df6da21c7ea3c5a8cc3d25bc92d82a88c8e25e4df3ef869ffdd31e98c8373e61f1bd44114baa53016ac528177b56db2693620b8c3255bed6842e9fa70be1e785a7b66a245a82ebe3941573b139d27f3f934550cb18ca99bc76b4eaa67aed625b01715addfabcc868c2e79813ebc06375d315a9c8ebd2414530647b00e982e4fdb3741353f93b7db2e48aeff839a83d93d", @typed={0x8, 0x3e, @uid=r8}, @typed={0x8, 0x2e, @u32=0x7}, @typed={0x8, 0x30, @uid=r9}, @generic="587bea8901c017d2c46ad0b4c368af8932fe0437a21993ea95a993acc9a40b4d7aa8d167d91387ecf493af2af6c1358b1de16782e42f9b254401bd6f46261c00e1b66277d117cf9126caa8180a0aed413a51fdb3db8579f5019b4e6bccbf3f5050b11e4b0dbb1e4fb974bb029d61f22e45bcf22dcd764d5e342cd019744e80e752a164601b97b6c12c74943ae3c06821fd48b048353ba3fd4bb5222d7c0aeb02c1bda6f7e4"]}]}, 0x33c}, {&(0x7f0000001c00)={0x150, 0x19, 0x8, 0x70bd2a, 0x25dfdbff, "", [@generic="86b646b66458f642b2d56d67a7cd8bfe917f16574302677993b2b97da10b2dc27c2ef913cf1475a26a0502532dca1d642f7969b3f395cf4bb1b295dc11619d5a1865fcf24bfff77e9d0351aade9196b74e83a666b028340e79f4fa68b60e011f446727e48266f2d023dc6044b99c87026cbaf5939d329f14322db1fba9fe05ce227045a3dd29f228cefa49f2209de71c2be7", @typed={0x8, 0x59, @ipv4=@multicast2}, @generic="ac3dbe474ede6f14762278a20983a5f7a046bb9fad199f3484599d03f47bbac89a067a7516ba64eb540f4d9704b0a80daa24fd2e8d9e3f424f51597479db2967ff2e313ccba921c31820f737e7213a02ae143e1dac5155ad9009497c4495184856bfea213675fb47bd3bb8628d562bc52bb7ce99546eaa5e8c4b4f636117026e38d9a9f82dec7cf3197c26725d86032e39a744bbea004b2c46cf3ff8c3276880d064143d1197"]}, 0x150}, {&(0x7f0000001d80)={0xf8, 0x1b, 0xa00, 0x70bd2a, 0x25dfdbff, "", [@typed={0xb8, 0x15, @binary="c0c9222e7093a1be913100262f428db82f315bc38208f9cbfbc361186cc3ac806c6ed4cd8b99c9f2ac977919d2a52ca722f8a6aef8ee419568c68ea5b1746060e2c905bd09ce414715d1209f72ae95b3350693c7338493c42a07d7a901885ea4b1dfa9ed127e94be20b08ac40d9ccf455c2f660cf769647e661d63b8fce20cc2459f235f678bc3f626728ab3cc604cd8cba10e214c0ce6dd37c35e0448ecb89884d430748e542cb10e3e7d678f17e9300a2f"}, @generic="863224c939ffb6e922df34d1eac8a93caaa27d4988c5ebdf9e285d2e5a34beffee", @typed={0xc, 0x94, @u64=0x3}]}, 0xf8}], 0x5, &(0x7f0000001f00)=[@rights={{0x28, 0x1, 0x1, [r2, r2, r0, r0, r2, r2]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r2, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r2, r0, r2]}}, @rights={{0x1c, 0x1, 0x1, [r2, r2, r0]}}], 0x88, 0x1}, 0x40) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000002000), &(0x7f0000002040)=0x4) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f0000002080)=0x1, 0x4) recvmmsg(r2, &(0x7f00000038c0)=[{{&(0x7f00000020c0)=@xdp, 0x80, &(0x7f0000003140)=[{&(0x7f0000002140)=""/4096, 0x1000}], 0x1, &(0x7f0000003180)=""/161, 0xa1}, 0x2}, {{&(0x7f0000003240)=@alg, 0x80, &(0x7f00000035c0)=[{&(0x7f00000032c0)=""/90, 0x5a}, {&(0x7f0000003340)}, {&(0x7f0000003380)=""/71, 0x47}, {&(0x7f0000003400)=""/18, 0x12}, {&(0x7f0000003440)=""/108, 0x6c}, {&(0x7f00000034c0)=""/120, 0x78}, {&(0x7f0000003540)=""/103, 0x67}], 0x7}, 0x7f}, {{&(0x7f0000003640)=@caif=@util, 0x80, &(0x7f0000003800)=[{&(0x7f00000036c0)=""/89, 0x59}, {&(0x7f0000003740)=""/28, 0x1c}, {&(0x7f0000003780)=""/100, 0x64}], 0x3, &(0x7f0000003840)=""/112, 0x70}, 0xfffffffffffff11a}], 0x3, 0x40000000, &(0x7f0000003980)={0x77359400}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000001, 0x5050, r2, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x8000) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000003a80)={'broute\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000039c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x0, [{}]}, 0x88) ioctl$SG_GET_NUM_WAITING(r2, 0x227d, &(0x7f0000003b40)) kcmp(r1, r1, 0x7, r0, 0xffffffffffffff9c) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f0000003b80)={0x9100000000000000, 0x5000, 0x4, 0xf, 0xb}) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000003bc0)=0x402a) getsockopt$inet_dccp_buf(r2, 0x21, 0xe, &(0x7f0000003c00)=""/4096, &(0x7f0000004c00)=0x1000) sched_yield() 07:54:24 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:24 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:24 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:24 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:24 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:24 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:24 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:24 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r1, 0x5d07, 0x5}, 0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000540)={@rand_addr, 0x0}, &(0x7f0000000580)=0x14) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) io_uring_register$IORING_UNREGISTER_FILES(r4, 0x3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000600)={r1, @in={{0x2, 0x4e22, @loopback}}}, 0x84) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f00000006c0)=0x1) socket$unix(0x1, 0x5, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x113, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000780)={0x4, 0x8, 0xfa00, {r5}}, 0x10) setsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f00000007c0)=@int=0x5, 0x4) ioctl$CAPI_INSTALLED(r0, 0x80024322) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000840)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f0000000a00)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000009c0)={&(0x7f0000000880)={0x120, r6, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xd7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x401}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x401}]}, @TIPC_NLA_MEDIA={0x68, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x800}, 0xbd015ee0a4ec138f) openat$rtc(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/rtc0\x00', 0x2000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000a80)=0x9) sendmsg$nl_route(r0, &(0x7f0000000cc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2040000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000b00)=@mpls_getroute={0x170, 0x1a, 0x0, 0x70bd2b, 0x25dfdbfc, {0x1c, 0x10, 0x90, 0x22, 0x0, 0x1, 0xfd, 0x0, 0x200}, [@RTA_TTL_PROPAGATE={0x8, 0x1a, 0x5}, @RTA_TTL_PROPAGATE={0x8, 0x1a, 0x13}, @RTA_VIA={0x14, 0x12, {0x8, "970894285f3e44003d77d686f182"}}, @RTA_NEWDST={0x84, 0x13, [{}, {0x5, 0x0, 0x9}, {0x4, 0x0, 0x6}, {0x0, 0x0, 0x1}, {0x100000000, 0x0, 0x8000}, {0x5e, 0x0, 0x7fff}, {0xffffffff, 0x0, 0x4}, {0x81, 0x0, 0x2}, {0x3, 0x0, 0x3}, {0x3835, 0x0, 0x8}, {0x1ff, 0x0, 0x3f}, {0x6, 0x0, 0xfffffffffffffff8}, {0x2, 0x0, 0x8}, {0x100, 0x0, 0x5}, {0xffff, 0x0, 0x8}, {0x6, 0x0, 0x5}, {0xfffffffffffffff9, 0x0, 0xfffffffffffffff9}, {0x7f, 0x0, 0x2d}, {0xf58, 0x0, 0xb64f}, {0x2, 0x0, 0x3}, {0x8}, {0x3, 0x0, 0x1f}, {0x2, 0x0, 0x173d}, {0xffff, 0x0, 0x1000}, {0x20, 0x0, 0x6}, {0x7, 0x0, 0x456}, {0x3, 0x0, 0x1}, {0x2937, 0x0, 0x2}, {0xffff, 0x0, 0x15}, {0x3, 0x0, 0x7}, {0x3, 0x0, 0xffffffffffffff47}, {0x101, 0x0, 0xa0000000000000}]}, @RTA_TTL_PROPAGATE={0x8, 0x1a, 0x400}, @RTA_OIF={0x8, 0x4, r2}, @RTA_OIF={0x8, 0x4, r2}, @RTA_OIF={0x8, 0x4, r2}, @RTA_DST={0x8, 0x1, {0x1, 0x0, 0xf2}}, @RTA_NEWDST={0x84, 0x13, [{0x7, 0x0, 0x8}, {0x9, 0x0, 0x6}, {0x8000, 0x0, 0x55ba}, {0x3, 0x0, 0x1}, {0x7, 0x0, 0x9}, {0x5, 0x0, 0xfffffffffffffffa}, {0x6, 0x0, 0x2}, {0x88, 0x0, 0x2e78}, {0x5, 0x0, 0x3}, {0x8000, 0x0, 0x7}, {0x8001, 0x0, 0xb71}, {0x7f, 0x0, 0x2}, {0x5, 0x0, 0x80}, {0x3, 0x0, 0xffffffff}, {0x2, 0x0, 0x9}, {0x7, 0x0, 0x8}, {0xfff, 0x0, 0x38}, {0xfffffffffffffffc, 0x0, 0x5}, {0xb, 0x0, 0x1}, {0x0, 0x0, 0x5}, {0x0, 0x0, 0x5}, {0x7, 0x0, 0x100000000}, {0x400, 0x0, 0x9}, {0xbe, 0x0, 0x1b7}, {0xffffffffffff8001, 0x0, 0x1}, {0x9, 0x0, 0xfffffffffffffff7}, {0x7ff, 0x0, 0x7}, {0x101, 0x0, 0xef12000000}, {0xea22, 0x0, 0x3f}, {0x0, 0x0, 0x8302}, {0x8000}, {0x3, 0x0, 0x1}]}]}, 0x170}, 0x1, 0x0, 0x0, 0x880}, 0x4081) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000d00), 0x4) ioctl$KVM_PPC_ALLOCATE_HTAB(r4, 0xc004aea7, &(0x7f0000000d40)=0x7fffffff) write$P9_RGETLOCK(r4, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:24 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:24 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:24 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:24 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:24 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:24 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:24 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x10000, 0x200, 0x5, 0x1}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@sq={'sq'}}, {@sq={'sq', 0x3d, 0x7ff}}, {@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x7}}, {@common=@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) accept4$rose(r0, &(0x7f0000000340)=@short={0xb, @dev, @bcast, 0x1, @bcast}, &(0x7f0000000380)=0x1c, 0x800) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000003c0)=""/141) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xf63a}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r1, 0x5d07, 0x5}, 0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000540)={@rand_addr, 0x0}, &(0x7f0000000580)=0x14) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) io_uring_register$IORING_UNREGISTER_FILES(r4, 0x3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000600)={r1, @in={{0x2, 0x4e22, @loopback}}}, 0x84) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f00000006c0)=0x1) socket$unix(0x1, 0x5, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x113, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000780)={0x4, 0x8, 0xfa00, {r5}}, 0x10) setsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f00000007c0)=@int=0x5, 0x4) ioctl$CAPI_INSTALLED(r0, 0x80024322) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000840)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f0000000a00)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000009c0)={&(0x7f0000000880)={0x120, r6, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xd7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x401}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x401}]}, @TIPC_NLA_MEDIA={0x68, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x800}, 0xbd015ee0a4ec138f) openat$rtc(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/rtc0\x00', 0x2000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000a80)=0x9) sendmsg$nl_route(r0, &(0x7f0000000cc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2040000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000b00)=@mpls_getroute={0x170, 0x1a, 0x0, 0x70bd2b, 0x25dfdbfc, {0x1c, 0x10, 0x90, 0x22, 0x0, 0x1, 0xfd, 0x0, 0x200}, [@RTA_TTL_PROPAGATE={0x8, 0x1a, 0x5}, @RTA_TTL_PROPAGATE={0x8, 0x1a, 0x13}, @RTA_VIA={0x14, 0x12, {0x8, "970894285f3e44003d77d686f182"}}, @RTA_NEWDST={0x84, 0x13, [{}, {0x5, 0x0, 0x9}, {0x4, 0x0, 0x6}, {0x0, 0x0, 0x1}, {0x100000000, 0x0, 0x8000}, {0x5e, 0x0, 0x7fff}, {0xffffffff, 0x0, 0x4}, {0x81, 0x0, 0x2}, {0x3, 0x0, 0x3}, {0x3835, 0x0, 0x8}, {0x1ff, 0x0, 0x3f}, {0x6, 0x0, 0xfffffffffffffff8}, {0x2, 0x0, 0x8}, {0x100, 0x0, 0x5}, {0xffff, 0x0, 0x8}, {0x6, 0x0, 0x5}, {0xfffffffffffffff9, 0x0, 0xfffffffffffffff9}, {0x7f, 0x0, 0x2d}, {0xf58, 0x0, 0xb64f}, {0x2, 0x0, 0x3}, {0x8}, {0x3, 0x0, 0x1f}, {0x2, 0x0, 0x173d}, {0xffff, 0x0, 0x1000}, {0x20, 0x0, 0x6}, {0x7, 0x0, 0x456}, {0x3, 0x0, 0x1}, {0x2937, 0x0, 0x2}, {0xffff, 0x0, 0x15}, {0x3, 0x0, 0x7}, {0x3, 0x0, 0xffffffffffffff47}, {0x101, 0x0, 0xa0000000000000}]}, @RTA_TTL_PROPAGATE={0x8, 0x1a, 0x400}, @RTA_OIF={0x8, 0x4, r2}, @RTA_OIF={0x8, 0x4, r2}, @RTA_OIF={0x8, 0x4, r2}, @RTA_DST={0x8, 0x1, {0x1, 0x0, 0xf2}}, @RTA_NEWDST={0x84, 0x13, [{0x7, 0x0, 0x8}, {0x9, 0x0, 0x6}, {0x8000, 0x0, 0x55ba}, {0x3, 0x0, 0x1}, {0x7, 0x0, 0x9}, {0x5, 0x0, 0xfffffffffffffffa}, {0x6, 0x0, 0x2}, {0x88, 0x0, 0x2e78}, {0x5, 0x0, 0x3}, {0x8000, 0x0, 0x7}, {0x8001, 0x0, 0xb71}, {0x7f, 0x0, 0x2}, {0x5, 0x0, 0x80}, {0x3, 0x0, 0xffffffff}, {0x2, 0x0, 0x9}, {0x7, 0x0, 0x8}, {0xfff, 0x0, 0x38}, {0xfffffffffffffffc, 0x0, 0x5}, {0xb, 0x0, 0x1}, {0x0, 0x0, 0x5}, {0x0, 0x0, 0x5}, {0x7, 0x0, 0x100000000}, {0x400, 0x0, 0x9}, {0xbe, 0x0, 0x1b7}, {0xffffffffffff8001, 0x0, 0x1}, {0x9, 0x0, 0xfffffffffffffff7}, {0x7ff, 0x0, 0x7}, {0x101, 0x0, 0xef12000000}, {0xea22, 0x0, 0x3f}, {0x0, 0x0, 0x8302}, {0x8000}, {0x3, 0x0, 0x1}]}]}, 0x170}, 0x1, 0x0, 0x0, 0x880}, 0x4081) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000d00), 0x4) ioctl$KVM_PPC_ALLOCATE_HTAB(r4, 0xc004aea7, &(0x7f0000000d40)=0x7fffffff) write$P9_RGETLOCK(r4, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:24 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:24 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:24 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:24 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:24 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:25 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:25 executing program 0 (fault-call:0 fault-nth:0): io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7}) 07:54:25 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:25 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:25 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:25 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) [ 101.088860][ T9745] FAULT_INJECTION: forcing a failure. [ 101.088860][ T9745] name failslab, interval 1, probability 0, space 0, times 1 [ 101.122092][ T9745] CPU: 0 PID: 9745 Comm: syz-executor.0 Not tainted 5.2.0+ #55 [ 101.129689][ T9745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.139758][ T9745] Call Trace: [ 101.143070][ T9745] dump_stack+0x172/0x1f0 [ 101.147442][ T9745] should_fail.cold+0xa/0x15 [ 101.152043][ T9745] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 101.157957][ T9745] ? ___might_sleep+0x163/0x280 [ 101.162839][ T9745] __should_failslab+0x121/0x190 [ 101.167786][ T9745] should_failslab+0x9/0x14 [ 101.172289][ T9745] kmem_cache_alloc_trace+0x2ce/0x750 [ 101.177678][ T9745] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 101.183958][ T9745] ? ns_capable_common+0x93/0x100 07:54:25 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) [ 101.189000][ T9745] io_uring_setup+0x257/0x1a30 [ 101.193783][ T9745] ? io_uring_release+0x50/0x50 [ 101.198815][ T9745] ? fput_many+0x12c/0x1a0 [ 101.203248][ T9745] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 101.208733][ T9745] ? do_syscall_64+0x26/0x680 [ 101.213420][ T9745] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 101.219504][ T9745] ? do_syscall_64+0x26/0x680 [ 101.224221][ T9745] ? lockdep_hardirqs_on+0x418/0x5d0 [ 101.224259][ T9745] __x64_sys_io_uring_setup+0x54/0x80 [ 101.224289][ T9745] do_syscall_64+0xfd/0x680 [ 101.224329][ T9745] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 101.224350][ T9745] RIP: 0033:0x4597c9 [ 101.249272][ T9745] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 101.268879][ T9745] RSP: 002b:00007fc883a4cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 101.268904][ T9745] RAX: ffffffffffffffda RBX: 00007fc883a4cc90 RCX: 00000000004597c9 07:54:25 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:25 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) [ 101.285990][ T9745] RDX: 0000000000000000 RSI: 00000000200013c0 RDI: 00000000000008a8 [ 101.294049][ T9745] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 101.302122][ T9745] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc883a4d6d4 [ 101.310097][ T9745] R13: 00000000004c0bb0 R14: 00000000004d39c8 R15: 0000000000000003 07:54:25 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:25 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:25 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:25 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:25 executing program 0 (fault-call:0 fault-nth:1): io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7}) 07:54:25 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:25 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:25 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:25 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:25 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:25 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:25 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:25 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) [ 101.867270][ T9792] FAULT_INJECTION: forcing a failure. [ 101.867270][ T9792] name fail_page_alloc, interval 1, probability 0, space 0, times 1 07:54:26 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:26 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) [ 102.016389][ T9792] CPU: 0 PID: 9792 Comm: syz-executor.0 Not tainted 5.2.0+ #55 [ 102.023978][ T9792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.034033][ T9792] Call Trace: [ 102.037363][ T9792] dump_stack+0x172/0x1f0 [ 102.041716][ T9792] should_fail.cold+0xa/0x15 [ 102.046325][ T9792] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 102.052165][ T9792] ? ___might_sleep+0x163/0x280 [ 102.057041][ T9792] should_fail_alloc_page+0x50/0x60 [ 102.062245][ T9792] __alloc_pages_nodemask+0x1a1/0x8d0 [ 102.067628][ T9792] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 102.073375][ T9792] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 102.079634][ T9792] alloc_pages_current+0x107/0x210 [ 102.084753][ T9792] ? lockdep_init_map+0x1be/0x6d0 [ 102.089783][ T9792] __get_free_pages+0xc/0x40 [ 102.094384][ T9792] io_mem_alloc+0x2b/0x30 [ 102.098740][ T9792] io_uring_setup+0x79d/0x1a30 [ 102.103504][ T9792] ? io_uring_release+0x50/0x50 [ 102.103520][ T9792] ? fput_many+0x12c/0x1a0 07:54:26 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) [ 102.103547][ T9792] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 102.103561][ T9792] ? do_syscall_64+0x26/0x680 [ 102.103577][ T9792] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 102.103591][ T9792] ? do_syscall_64+0x26/0x680 [ 102.103608][ T9792] ? lockdep_hardirqs_on+0x418/0x5d0 [ 102.103627][ T9792] __x64_sys_io_uring_setup+0x54/0x80 [ 102.103643][ T9792] do_syscall_64+0xfd/0x680 [ 102.103663][ T9792] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 102.148874][ T9792] RIP: 0033:0x4597c9 [ 102.148892][ T9792] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 102.148901][ T9792] RSP: 002b:00007fc883a4cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 102.148916][ T9792] RAX: ffffffffffffffda RBX: 00007fc883a4cc90 RCX: 00000000004597c9 [ 102.148924][ T9792] RDX: 0000000000000000 RSI: 00000000200013c0 RDI: 00000000000008a8 [ 102.148933][ T9792] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 102.148948][ T9792] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc883a4d6d4 [ 102.186700][ T9792] R13: 00000000004c0bb0 R14: 00000000004d39c8 R15: 0000000000000003 07:54:26 executing program 0 (fault-call:0 fault-nth:2): io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7}) 07:54:26 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:26 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:26 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:26 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:26 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:26 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:26 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:26 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) [ 102.453158][ T9826] FAULT_INJECTION: forcing a failure. [ 102.453158][ T9826] name fail_page_alloc, interval 1, probability 0, space 0, times 0 07:54:26 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:26 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) [ 102.530814][ T9826] CPU: 0 PID: 9826 Comm: syz-executor.0 Not tainted 5.2.0+ #55 [ 102.538491][ T9826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.548649][ T9826] Call Trace: [ 102.551956][ T9826] dump_stack+0x172/0x1f0 [ 102.556423][ T9826] should_fail.cold+0xa/0x15 [ 102.561043][ T9826] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 102.566861][ T9826] ? ___might_sleep+0x163/0x280 [ 102.571727][ T9826] should_fail_alloc_page+0x50/0x60 [ 102.576930][ T9826] __alloc_pages_nodemask+0x1a1/0x8d0 [ 102.582309][ T9826] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 102.588046][ T9826] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 102.594487][ T9826] alloc_pages_current+0x107/0x210 [ 102.599698][ T9826] ? lockdep_init_map+0x1be/0x6d0 [ 102.604732][ T9826] __get_free_pages+0xc/0x40 [ 102.609333][ T9826] io_mem_alloc+0x2b/0x30 [ 102.613677][ T9826] io_uring_setup+0x8b6/0x1a30 [ 102.618450][ T9826] ? io_uring_release+0x50/0x50 [ 102.623308][ T9826] ? fput_many+0x12c/0x1a0 07:54:26 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) [ 102.627742][ T9826] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 102.633202][ T9826] ? do_syscall_64+0x26/0x680 [ 102.637883][ T9826] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 102.643951][ T9826] ? do_syscall_64+0x26/0x680 [ 102.648718][ T9826] ? lockdep_hardirqs_on+0x418/0x5d0 [ 102.654015][ T9826] __x64_sys_io_uring_setup+0x54/0x80 [ 102.659479][ T9826] do_syscall_64+0xfd/0x680 [ 102.663991][ T9826] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 102.669888][ T9826] RIP: 0033:0x4597c9 [ 102.673785][ T9826] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 102.693399][ T9826] RSP: 002b:00007fc883a4cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 102.701904][ T9826] RAX: ffffffffffffffda RBX: 00007fc883a4cc90 RCX: 00000000004597c9 [ 102.709877][ T9826] RDX: 0000000000000000 RSI: 00000000200013c0 RDI: 00000000000008a8 [ 102.717848][ T9826] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 102.725823][ T9826] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc883a4d6d4 [ 102.733800][ T9826] R13: 00000000004c0bb0 R14: 00000000004d39c8 R15: 0000000000000003 07:54:26 executing program 0 (fault-call:0 fault-nth:3): io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7}) 07:54:26 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:26 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:26 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:26 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:26 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:27 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:27 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:27 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) [ 103.033696][ T9861] FAULT_INJECTION: forcing a failure. [ 103.033696][ T9861] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 103.076143][ T9861] CPU: 1 PID: 9861 Comm: syz-executor.0 Not tainted 5.2.0+ #55 [ 103.083732][ T9861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 103.083740][ T9861] Call Trace: [ 103.083763][ T9861] dump_stack+0x172/0x1f0 [ 103.083790][ T9861] should_fail.cold+0xa/0x15 [ 103.083813][ T9861] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 103.083833][ T9861] ? ___might_sleep+0x163/0x280 [ 103.083865][ T9861] should_fail_alloc_page+0x50/0x60 [ 103.112898][ T9861] __alloc_pages_nodemask+0x1a1/0x8d0 [ 103.112920][ T9861] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 103.112949][ T9861] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 103.112970][ T9861] alloc_pages_current+0x107/0x210 [ 103.112986][ T9861] ? lockdep_init_map+0x1be/0x6d0 [ 103.113007][ T9861] __get_free_pages+0xc/0x40 [ 103.155105][ T9861] io_mem_alloc+0x2b/0x30 [ 103.159456][ T9861] io_uring_setup+0x900/0x1a30 [ 103.164234][ T9861] ? io_uring_release+0x50/0x50 [ 103.169091][ T9861] ? fput_many+0x12c/0x1a0 [ 103.173531][ T9861] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 103.178996][ T9861] ? do_syscall_64+0x26/0x680 [ 103.183683][ T9861] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 103.189755][ T9861] ? do_syscall_64+0x26/0x680 [ 103.194447][ T9861] ? lockdep_hardirqs_on+0x418/0x5d0 [ 103.199988][ T9861] __x64_sys_io_uring_setup+0x54/0x80 [ 103.205366][ T9861] do_syscall_64+0xfd/0x680 [ 103.209879][ T9861] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 103.215771][ T9861] RIP: 0033:0x4597c9 [ 103.219667][ T9861] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 103.239284][ T9861] RSP: 002b:00007fc883a4cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 103.247714][ T9861] RAX: ffffffffffffffda RBX: 00007fc883a4cc90 RCX: 00000000004597c9 [ 103.255714][ T9861] RDX: 0000000000000000 RSI: 00000000200013c0 RDI: 00000000000008a8 [ 103.263704][ T9861] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:54:27 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:27 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) [ 103.271689][ T9861] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc883a4d6d4 [ 103.279673][ T9861] R13: 00000000004c0bb0 R14: 00000000004d39c8 R15: 0000000000000003 07:54:27 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:27 executing program 0 (fault-call:0 fault-nth:4): io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7}) 07:54:27 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:27 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:27 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:27 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:27 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) [ 103.641683][ T9891] FAULT_INJECTION: forcing a failure. [ 103.641683][ T9891] name failslab, interval 1, probability 0, space 0, times 0 07:54:27 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:27 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) [ 103.692257][ T9891] CPU: 0 PID: 9891 Comm: syz-executor.0 Not tainted 5.2.0+ #55 [ 103.699843][ T9891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 103.709912][ T9891] Call Trace: [ 103.713221][ T9891] dump_stack+0x172/0x1f0 [ 103.717573][ T9891] should_fail.cold+0xa/0x15 [ 103.722177][ T9891] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 103.727999][ T9891] ? ___might_sleep+0x163/0x280 [ 103.732870][ T9891] __should_failslab+0x121/0x190 [ 103.737931][ T9891] ? io_submit_sqes+0x360/0x360 07:54:27 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) [ 103.742795][ T9891] should_failslab+0x9/0x14 [ 103.747303][ T9891] kmem_cache_alloc_trace+0x2ce/0x750 [ 103.752700][ T9891] ? lockdep_init_map+0x1be/0x6d0 [ 103.757758][ T9891] ? io_submit_sqes+0x360/0x360 [ 103.762627][ T9891] __kthread_create_on_node+0xf2/0x460 [ 103.768108][ T9891] ? kthread_parkme+0xb0/0xb0 [ 103.772805][ T9891] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 103.779066][ T9891] ? refcount_sub_and_test_checked+0x154/0x200 [ 103.785226][ T9891] ? refcount_dec_not_one+0x1f0/0x1f0 [ 103.790615][ T9891] ? io_submit_sqes+0x360/0x360 [ 103.795480][ T9891] kthread_create_on_node+0xbb/0xf0 [ 103.800690][ T9891] ? __kthread_create_on_node+0x460/0x460 [ 103.806425][ T9891] ? refcount_dec_and_test_checked+0x1b/0x20 [ 103.812423][ T9891] ? cap_capable+0x205/0x270 [ 103.817035][ T9891] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 103.823286][ T9891] ? security_capable+0x95/0xc0 [ 103.828149][ T9891] ? io_submit_sqes+0x360/0x360 [ 103.833008][ T9891] kthread_create_on_cpu+0x35/0x1f0 [ 103.838216][ T9891] io_uring_setup+0x1502/0x1a30 07:54:27 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:27 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:27 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) [ 103.843081][ T9891] ? io_uring_release+0x50/0x50 [ 103.847945][ T9891] ? fput_many+0x12c/0x1a0 [ 103.852378][ T9891] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 103.857847][ T9891] ? do_syscall_64+0x26/0x680 [ 103.862532][ T9891] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 103.868601][ T9891] ? do_syscall_64+0x26/0x680 [ 103.873283][ T9891] ? lockdep_hardirqs_on+0x418/0x5d0 [ 103.878581][ T9891] __x64_sys_io_uring_setup+0x54/0x80 [ 103.883961][ T9891] do_syscall_64+0xfd/0x680 [ 103.888482][ T9891] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 103.894376][ T9891] RIP: 0033:0x4597c9 [ 103.898275][ T9891] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 103.917891][ T9891] RSP: 002b:00007fc883a4cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 103.926309][ T9891] RAX: ffffffffffffffda RBX: 00007fc883a4cc90 RCX: 00000000004597c9 [ 103.934288][ T9891] RDX: 0000000000000000 RSI: 00000000200013c0 RDI: 00000000000008a8 [ 103.942268][ T9891] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 103.950246][ T9891] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc883a4d6d4 [ 103.958308][ T9891] R13: 00000000004c0bb0 R14: 00000000004d39c8 R15: 0000000000000003 07:54:28 executing program 0 (fault-call:0 fault-nth:5): io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7}) 07:54:28 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:28 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:28 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:28 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:28 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:28 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:28 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:28 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:28 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) [ 104.348089][ T9931] FAULT_INJECTION: forcing a failure. [ 104.348089][ T9931] name failslab, interval 1, probability 0, space 0, times 0 [ 104.377332][ T9931] CPU: 0 PID: 9931 Comm: syz-executor.0 Not tainted 5.2.0+ #55 [ 104.384959][ T9931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.395035][ T9931] Call Trace: [ 104.398340][ T9931] dump_stack+0x172/0x1f0 [ 104.402694][ T9931] should_fail.cold+0xa/0x15 [ 104.407485][ T9931] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 104.413303][ T9931] ? ___might_sleep+0x163/0x280 [ 104.413326][ T9931] __should_failslab+0x121/0x190 [ 104.413342][ T9931] should_failslab+0x9/0x14 [ 104.413354][ T9931] __kmalloc+0x2d9/0x740 [ 104.413370][ T9931] ? lock_downgrade+0x920/0x920 [ 104.413386][ T9931] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 104.413397][ T9931] ? try_to_wake_up+0x6f1/0x1a10 [ 104.413417][ T9931] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 104.444154][ T9931] ? lockdep_hardirqs_on+0x418/0x5d0 [ 104.444170][ T9931] ? alloc_workqueue+0x166/0xf40 [ 104.444187][ T9931] alloc_workqueue+0x166/0xf40 [ 104.444203][ T9931] ? try_to_wake_up+0x6f1/0x1a10 [ 104.444216][ T9931] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 104.444232][ T9931] ? migrate_swap_stop+0x990/0x990 [ 104.444249][ T9931] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 104.444265][ T9931] ? __kthread_bind_mask+0xae/0xc0 [ 104.444294][ T9931] io_uring_setup+0xbc7/0x1a30 [ 104.480771][ T9931] ? io_uring_release+0x50/0x50 [ 104.480790][ T9931] ? fput_many+0x12c/0x1a0 [ 104.480818][ T9931] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 104.480841][ T9931] ? do_syscall_64+0x26/0x680 [ 104.521038][ T9931] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 104.527146][ T9931] ? do_syscall_64+0x26/0x680 [ 104.531843][ T9931] ? lockdep_hardirqs_on+0x418/0x5d0 [ 104.531868][ T9931] __x64_sys_io_uring_setup+0x54/0x80 [ 104.531886][ T9931] do_syscall_64+0xfd/0x680 [ 104.531911][ T9931] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 104.552961][ T9931] RIP: 0033:0x4597c9 [ 104.557287][ T9931] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 104.576901][ T9931] RSP: 002b:00007fc883a4cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 104.585415][ T9931] RAX: ffffffffffffffda RBX: 00007fc883a4cc90 RCX: 00000000004597c9 07:54:28 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:28 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) [ 104.593395][ T9931] RDX: 0000000000000000 RSI: 00000000200013c0 RDI: 00000000000008a8 [ 104.601386][ T9931] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 104.609402][ T9931] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc883a4d6d4 [ 104.617386][ T9931] R13: 00000000004c0bb0 R14: 00000000004d39c8 R15: 0000000000000003 07:54:29 executing program 0 (fault-call:0 fault-nth:6): io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7}) 07:54:29 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:29 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:29 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:29 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:29 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:29 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:29 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:29 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:29 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) [ 105.046760][ T9968] FAULT_INJECTION: forcing a failure. [ 105.046760][ T9968] name failslab, interval 1, probability 0, space 0, times 0 [ 105.111541][ T9968] CPU: 1 PID: 9968 Comm: syz-executor.0 Not tainted 5.2.0+ #55 [ 105.119136][ T9968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.129193][ T9968] Call Trace: [ 105.132501][ T9968] dump_stack+0x172/0x1f0 [ 105.136851][ T9968] should_fail.cold+0xa/0x15 [ 105.141455][ T9968] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 105.147366][ T9968] ? ___might_sleep+0x163/0x280 [ 105.152232][ T9968] __should_failslab+0x121/0x190 [ 105.157177][ T9968] should_failslab+0x9/0x14 [ 105.161684][ T9968] kmem_cache_alloc_trace+0x2ce/0x750 [ 105.167059][ T9968] ? __kmalloc+0x5d2/0x740 [ 105.171481][ T9968] ? lock_downgrade+0x920/0x920 [ 105.176342][ T9968] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 105.182152][ T9968] ? try_to_wake_up+0x6f1/0x1a10 [ 105.187094][ T9968] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 105.192907][ T9968] alloc_workqueue_attrs+0x3d/0xc0 [ 105.199072][ T9968] alloc_workqueue+0x18b/0xf40 [ 105.203845][ T9968] ? try_to_wake_up+0x6f1/0x1a10 [ 105.208786][ T9968] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 105.214512][ T9968] ? migrate_swap_stop+0x990/0x990 [ 105.219633][ T9968] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 105.225449][ T9968] ? __kthread_bind_mask+0xae/0xc0 [ 105.230582][ T9968] io_uring_setup+0xbc7/0x1a30 [ 105.235371][ T9968] ? io_uring_release+0x50/0x50 [ 105.240228][ T9968] ? fput_many+0x12c/0x1a0 [ 105.244673][ T9968] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 105.250143][ T9968] ? do_syscall_64+0x26/0x680 [ 105.254832][ T9968] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 105.260904][ T9968] ? do_syscall_64+0x26/0x680 [ 105.265595][ T9968] ? lockdep_hardirqs_on+0x418/0x5d0 [ 105.270894][ T9968] __x64_sys_io_uring_setup+0x54/0x80 [ 105.276277][ T9968] do_syscall_64+0xfd/0x680 [ 105.280796][ T9968] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 105.286687][ T9968] RIP: 0033:0x4597c9 [ 105.290584][ T9968] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:54:29 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:29 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) [ 105.310198][ T9968] RSP: 002b:00007fc883a4cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 105.318621][ T9968] RAX: ffffffffffffffda RBX: 00007fc883a4cc90 RCX: 00000000004597c9 [ 105.318640][ T9968] RDX: 0000000000000000 RSI: 00000000200013c0 RDI: 00000000000008a8 [ 105.334576][ T9968] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 105.334586][ T9968] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc883a4d6d4 [ 105.334595][ T9968] R13: 00000000004c0bb0 R14: 00000000004d39c8 R15: 0000000000000003 07:54:29 executing program 0 (fault-call:0 fault-nth:7): io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7}) 07:54:29 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:29 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:29 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:29 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:29 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:29 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:29 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:29 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:29 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) [ 105.621808][T10004] FAULT_INJECTION: forcing a failure. [ 105.621808][T10004] name failslab, interval 1, probability 0, space 0, times 0 07:54:29 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) [ 105.754778][T10004] CPU: 0 PID: 10004 Comm: syz-executor.0 Not tainted 5.2.0+ #55 [ 105.762478][T10004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.772541][T10004] Call Trace: [ 105.775845][T10004] dump_stack+0x172/0x1f0 [ 105.780192][T10004] should_fail.cold+0xa/0x15 [ 105.784803][T10004] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 105.790625][T10004] ? ___might_sleep+0x163/0x280 [ 105.795489][T10004] __should_failslab+0x121/0x190 [ 105.800428][T10004] should_failslab+0x9/0x14 [ 105.804934][T10004] __kmalloc_track_caller+0x2d5/0x740 [ 105.810306][T10004] ? pointer+0x750/0x750 [ 105.814558][T10004] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 105.820195][T10004] ? find_held_lock+0x35/0x130 [ 105.824963][T10004] ? kasprintf+0xbb/0xf0 [ 105.829215][T10004] kvasprintf+0xc8/0x170 [ 105.833464][T10004] ? bust_spinlocks+0xe0/0xe0 [ 105.838161][T10004] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 105.843883][T10004] ? find_next_bit+0x107/0x130 [ 105.848652][T10004] kasprintf+0xbb/0xf0 [ 105.852731][T10004] ? kvasprintf_const+0x190/0x190 [ 105.857948][T10004] ? kasan_check_read+0x11/0x20 [ 105.862814][T10004] alloc_workqueue+0x46c/0xf40 [ 105.867617][T10004] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 105.873376][T10004] ? migrate_swap_stop+0x990/0x990 [ 105.878499][T10004] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 105.884318][T10004] ? __kthread_bind_mask+0xae/0xc0 [ 105.889443][T10004] io_uring_setup+0xbc7/0x1a30 [ 105.894217][T10004] ? io_uring_release+0x50/0x50 [ 105.899075][T10004] ? fput_many+0x12c/0x1a0 07:54:30 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) [ 105.903507][T10004] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 105.908973][T10004] ? do_syscall_64+0x26/0x680 [ 105.913671][T10004] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 105.919738][T10004] ? do_syscall_64+0x26/0x680 [ 105.924424][T10004] ? lockdep_hardirqs_on+0x418/0x5d0 [ 105.929728][T10004] __x64_sys_io_uring_setup+0x54/0x80 [ 105.935133][T10004] do_syscall_64+0xfd/0x680 [ 105.939657][T10004] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 105.945547][T10004] RIP: 0033:0x4597c9 [ 105.949449][T10004] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 105.969057][T10004] RSP: 002b:00007fc883a4cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 105.969072][T10004] RAX: ffffffffffffffda RBX: 00007fc883a4cc90 RCX: 00000000004597c9 [ 105.969080][T10004] RDX: 0000000000000000 RSI: 00000000200013c0 RDI: 00000000000008a8 [ 105.969088][T10004] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 105.969096][T10004] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc883a4d6d4 [ 105.969104][T10004] R13: 00000000004c0bb0 R14: 00000000004d39c8 R15: 0000000000000003 07:54:30 executing program 0 (fault-call:0 fault-nth:8): io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7}) 07:54:30 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:30 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:30 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:30 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:30 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:30 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:30 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:30 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) [ 106.305286][T10045] FAULT_INJECTION: forcing a failure. [ 106.305286][T10045] name failslab, interval 1, probability 0, space 0, times 0 07:54:30 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:30 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) [ 106.375440][T10045] CPU: 1 PID: 10045 Comm: syz-executor.0 Not tainted 5.2.0+ #55 [ 106.383111][T10045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 106.393177][T10045] Call Trace: [ 106.396955][T10045] dump_stack+0x172/0x1f0 [ 106.401306][T10045] should_fail.cold+0xa/0x15 [ 106.405914][T10045] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 106.411733][T10045] ? ___might_sleep+0x163/0x280 [ 106.416599][T10045] __should_failslab+0x121/0x190 [ 106.421549][T10045] should_failslab+0x9/0x14 [ 106.426594][T10045] __kmalloc+0x2d9/0x740 [ 106.430860][T10045] ? apply_wqattrs_prepare+0xae/0x970 [ 106.436261][T10045] apply_wqattrs_prepare+0xae/0x970 [ 106.441475][T10045] apply_workqueue_attrs_locked+0xcb/0x140 [ 106.447285][T10045] alloc_workqueue+0x5f3/0xf40 [ 106.452066][T10045] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 106.457798][T10045] ? migrate_swap_stop+0x990/0x990 [ 106.462910][T10045] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 106.468717][T10045] ? __kthread_bind_mask+0xae/0xc0 07:54:30 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) [ 106.473838][T10045] io_uring_setup+0xbc7/0x1a30 [ 106.478694][T10045] ? io_uring_release+0x50/0x50 [ 106.483553][T10045] ? fput_many+0x12c/0x1a0 [ 106.487988][T10045] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 106.493513][T10045] ? do_syscall_64+0x26/0x680 [ 106.498689][T10045] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 106.504765][T10045] ? do_syscall_64+0x26/0x680 [ 106.509452][T10045] ? lockdep_hardirqs_on+0x418/0x5d0 [ 106.514751][T10045] __x64_sys_io_uring_setup+0x54/0x80 [ 106.520152][T10045] do_syscall_64+0xfd/0x680 [ 106.524668][T10045] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 106.530654][T10045] RIP: 0033:0x4597c9 [ 106.534544][T10045] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 106.554135][T10045] RSP: 002b:00007fc883a4cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 106.562841][T10045] RAX: ffffffffffffffda RBX: 00007fc883a4cc90 RCX: 00000000004597c9 [ 106.570822][T10045] RDX: 0000000000000000 RSI: 00000000200013c0 RDI: 00000000000008a8 [ 106.578788][T10045] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 106.578797][T10045] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc883a4d6d4 [ 106.578805][T10045] R13: 00000000004c0bb0 R14: 00000000004d39c8 R15: 0000000000000003 07:54:30 executing program 0 (fault-call:0 fault-nth:9): io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7}) 07:54:30 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:30 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:30 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:30 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:30 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:30 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:30 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:30 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:30 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:30 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) [ 106.826973][T10077] FAULT_INJECTION: forcing a failure. [ 106.826973][T10077] name failslab, interval 1, probability 0, space 0, times 0 [ 106.922190][T10077] CPU: 0 PID: 10077 Comm: syz-executor.0 Not tainted 5.2.0+ #55 [ 106.929865][T10077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 106.939919][T10077] Call Trace: [ 106.943223][T10077] dump_stack+0x172/0x1f0 [ 106.947575][T10077] should_fail.cold+0xa/0x15 [ 106.952177][T10077] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 106.958085][T10077] ? ___might_sleep+0x163/0x280 [ 106.962969][T10077] __should_failslab+0x121/0x190 [ 106.967913][T10077] should_failslab+0x9/0x14 [ 106.972418][T10077] kmem_cache_alloc_trace+0x2ce/0x750 [ 106.977801][T10077] ? __kmalloc+0x5d2/0x740 [ 106.982230][T10077] alloc_workqueue_attrs+0x3d/0xc0 [ 106.987350][T10077] apply_wqattrs_prepare+0xb6/0x970 [ 106.992565][T10077] apply_workqueue_attrs_locked+0xcb/0x140 [ 106.998484][T10077] alloc_workqueue+0x5f3/0xf40 [ 107.003254][T10077] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 107.008976][T10077] ? migrate_swap_stop+0x990/0x990 [ 107.014089][T10077] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 107.019906][T10077] ? __kthread_bind_mask+0xae/0xc0 [ 107.025071][T10077] io_uring_setup+0xbc7/0x1a30 [ 107.029845][T10077] ? io_uring_release+0x50/0x50 [ 107.035140][T10077] ? fput_many+0x12c/0x1a0 [ 107.039571][T10077] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 107.045037][T10077] ? do_syscall_64+0x26/0x680 [ 107.049717][T10077] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 107.055793][T10077] ? do_syscall_64+0x26/0x680 [ 107.060488][T10077] ? lockdep_hardirqs_on+0x418/0x5d0 [ 107.065799][T10077] __x64_sys_io_uring_setup+0x54/0x80 07:54:31 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) [ 107.071180][T10077] do_syscall_64+0xfd/0x680 [ 107.075707][T10077] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 107.081695][T10077] RIP: 0033:0x4597c9 [ 107.085591][T10077] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 107.105203][T10077] RSP: 002b:00007fc883a4cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 107.113626][T10077] RAX: ffffffffffffffda RBX: 00007fc883a4cc90 RCX: 00000000004597c9 [ 107.121600][T10077] RDX: 0000000000000000 RSI: 00000000200013c0 RDI: 00000000000008a8 [ 107.129574][T10077] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 107.137638][T10077] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc883a4d6d4 [ 107.145618][T10077] R13: 00000000004c0bb0 R14: 00000000004d39c8 R15: 0000000000000003 07:54:31 executing program 0 (fault-call:0 fault-nth:10): io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7}) 07:54:31 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:31 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:31 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:31 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:31 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:31 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) [ 107.436692][T10113] FAULT_INJECTION: forcing a failure. [ 107.436692][T10113] name failslab, interval 1, probability 0, space 0, times 0 [ 107.462202][T10113] CPU: 0 PID: 10113 Comm: syz-executor.0 Not tainted 5.2.0+ #55 [ 107.469871][T10113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 107.480362][T10113] Call Trace: [ 107.480388][T10113] dump_stack+0x172/0x1f0 [ 107.480414][T10113] should_fail.cold+0xa/0x15 [ 107.480436][T10113] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 107.480460][T10113] ? ___might_sleep+0x163/0x280 [ 107.480490][T10113] __should_failslab+0x121/0x190 [ 107.508200][T10113] should_failslab+0x9/0x14 [ 107.512713][T10113] kmem_cache_alloc_trace+0x2ce/0x750 [ 107.518174][T10113] ? __kmalloc+0x5d2/0x740 [ 107.522598][T10113] alloc_workqueue_attrs+0x3d/0xc0 [ 107.522617][T10113] apply_wqattrs_prepare+0xbe/0x970 [ 107.522644][T10113] apply_workqueue_attrs_locked+0xcb/0x140 [ 107.522660][T10113] alloc_workqueue+0x5f3/0xf40 [ 107.522680][T10113] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 107.522698][T10113] ? migrate_swap_stop+0x990/0x990 [ 107.522721][T10113] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 107.543588][T10113] ? __kthread_bind_mask+0xae/0xc0 [ 107.543614][T10113] io_uring_setup+0xbc7/0x1a30 [ 107.543633][T10113] ? io_uring_release+0x50/0x50 [ 107.543648][T10113] ? fput_many+0x12c/0x1a0 [ 107.543675][T10113] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 107.543690][T10113] ? do_syscall_64+0x26/0x680 [ 107.543713][T10113] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 107.560326][T10113] ? do_syscall_64+0x26/0x680 [ 107.560347][T10113] ? lockdep_hardirqs_on+0x418/0x5d0 [ 107.560369][T10113] __x64_sys_io_uring_setup+0x54/0x80 [ 107.560389][T10113] do_syscall_64+0xfd/0x680 [ 107.602458][T10113] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 107.602472][T10113] RIP: 0033:0x4597c9 [ 107.602487][T10113] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 107.602495][T10113] RSP: 002b:00007fc883a4cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 107.602509][T10113] RAX: ffffffffffffffda RBX: 00007fc883a4cc90 RCX: 00000000004597c9 [ 107.602517][T10113] RDX: 0000000000000000 RSI: 00000000200013c0 RDI: 00000000000008a8 [ 107.602525][T10113] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:54:31 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:31 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:31 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:31 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:31 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) [ 107.602534][T10113] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc883a4d6d4 [ 107.602549][T10113] R13: 00000000004c0bb0 R14: 00000000004d39c8 R15: 0000000000000003 07:54:31 executing program 0 (fault-call:0 fault-nth:11): io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7}) 07:54:31 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:31 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:31 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:31 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:31 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:32 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:32 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:32 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:32 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:32 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) [ 107.987574][T10147] FAULT_INJECTION: forcing a failure. [ 107.987574][T10147] name failslab, interval 1, probability 0, space 0, times 0 [ 108.043316][T10147] CPU: 0 PID: 10147 Comm: syz-executor.0 Not tainted 5.2.0+ #55 [ 108.050997][T10147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 108.061060][T10147] Call Trace: [ 108.064400][T10147] dump_stack+0x172/0x1f0 [ 108.068746][T10147] should_fail.cold+0xa/0x15 [ 108.073365][T10147] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 108.079187][T10147] ? ___might_sleep+0x163/0x280 [ 108.084055][T10147] __should_failslab+0x121/0x190 [ 108.089000][T10147] should_failslab+0x9/0x14 [ 108.093499][T10147] kmem_cache_alloc_node+0x261/0x710 [ 108.093526][T10147] alloc_unbound_pwq+0x4c5/0xcf0 [ 108.093550][T10147] apply_wqattrs_prepare+0x354/0x970 [ 108.093578][T10147] apply_workqueue_attrs_locked+0xcb/0x140 [ 108.093593][T10147] alloc_workqueue+0x5f3/0xf40 [ 108.093613][T10147] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 108.093638][T10147] ? migrate_swap_stop+0x990/0x990 [ 108.130477][T10147] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 108.136287][T10147] ? __kthread_bind_mask+0xae/0xc0 [ 108.141414][T10147] io_uring_setup+0xbc7/0x1a30 [ 108.146189][T10147] ? io_uring_release+0x50/0x50 [ 108.151042][T10147] ? fput_many+0x12c/0x1a0 [ 108.155473][T10147] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 108.160938][T10147] ? do_syscall_64+0x26/0x680 [ 108.165623][T10147] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 108.171693][T10147] ? do_syscall_64+0x26/0x680 [ 108.176374][T10147] ? lockdep_hardirqs_on+0x418/0x5d0 [ 108.181667][T10147] __x64_sys_io_uring_setup+0x54/0x80 [ 108.187048][T10147] do_syscall_64+0xfd/0x680 [ 108.191558][T10147] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 108.197458][T10147] RIP: 0033:0x4597c9 [ 108.197475][T10147] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 108.197483][T10147] RSP: 002b:00007fc883a4cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 108.197496][T10147] RAX: ffffffffffffffda RBX: 00007fc883a4cc90 RCX: 00000000004597c9 07:54:32 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) [ 108.197504][T10147] RDX: 0000000000000000 RSI: 00000000200013c0 RDI: 00000000000008a8 [ 108.197512][T10147] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 108.197520][T10147] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc883a4d6d4 [ 108.197527][T10147] R13: 00000000004c0bb0 R14: 00000000004d39c8 R15: 0000000000000003 07:54:32 executing program 0 (fault-call:0 fault-nth:12): io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7}) 07:54:32 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:32 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:32 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:32 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:32 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:32 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:32 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:32 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) [ 108.553766][T10180] FAULT_INJECTION: forcing a failure. [ 108.553766][T10180] name failslab, interval 1, probability 0, space 0, times 0 07:54:32 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) [ 108.689259][T10180] CPU: 1 PID: 10180 Comm: syz-executor.0 Not tainted 5.2.0+ #55 [ 108.696935][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 108.706996][T10180] Call Trace: [ 108.710296][T10180] dump_stack+0x172/0x1f0 [ 108.714655][T10180] should_fail.cold+0xa/0x15 [ 108.720262][T10180] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 108.726078][T10180] ? ___might_sleep+0x163/0x280 [ 108.730942][T10180] __should_failslab+0x121/0x190 [ 108.735889][T10180] ? sock_destroy_inode+0x70/0x70 [ 108.740912][T10180] should_failslab+0x9/0x14 [ 108.745419][T10180] kmem_cache_alloc+0x2af/0x6f0 [ 108.750277][T10180] ? ___might_sleep+0x163/0x280 [ 108.755132][T10180] ? __might_sleep+0x95/0x190 [ 108.759819][T10180] ? sock_destroy_inode+0x70/0x70 [ 108.764855][T10180] sock_alloc_inode+0x1d/0x260 [ 108.769636][T10180] alloc_inode+0x68/0x1e0 [ 108.773983][T10180] new_inode_pseudo+0x19/0xf0 [ 108.778674][T10180] sock_alloc+0x41/0x270 [ 108.782928][T10180] __sock_create+0xc2/0x730 [ 108.787441][T10180] ? migrate_swap_stop+0x990/0x990 [ 108.792562][T10180] sock_create_kern+0x3b/0x50 [ 108.797252][T10180] io_uring_setup+0xc23/0x1a30 [ 108.802026][T10180] ? io_uring_release+0x50/0x50 [ 108.806886][T10180] ? fput_many+0x12c/0x1a0 [ 108.811315][T10180] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 108.817820][T10180] ? do_syscall_64+0x26/0x680 [ 108.822504][T10180] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 108.828575][T10180] ? do_syscall_64+0x26/0x680 [ 108.833267][T10180] ? lockdep_hardirqs_on+0x418/0x5d0 07:54:32 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:32 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) [ 108.838560][T10180] __x64_sys_io_uring_setup+0x54/0x80 [ 108.843944][T10180] do_syscall_64+0xfd/0x680 [ 108.848448][T10180] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 108.854334][T10180] RIP: 0033:0x4597c9 [ 108.858230][T10180] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 108.878284][T10180] RSP: 002b:00007fc883a4cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 108.886677][T10180] RAX: ffffffffffffffda RBX: 00007fc883a4cc90 RCX: 00000000004597c9 [ 108.894630][T10180] RDX: 0000000000000000 RSI: 00000000200013c0 RDI: 00000000000008a8 [ 108.902581][T10180] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 108.910539][T10180] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc883a4d6d4 [ 108.918649][T10180] R13: 00000000004c0bb0 R14: 00000000004d39c8 R15: 0000000000000003 [ 108.945796][T10180] socket: no more sockets 07:54:33 executing program 0 (fault-call:0 fault-nth:13): io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7}) 07:54:33 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:33 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:33 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:33 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:33 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:33 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:33 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:33 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:33 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) [ 109.201738][T10218] FAULT_INJECTION: forcing a failure. [ 109.201738][T10218] name failslab, interval 1, probability 0, space 0, times 0 07:54:33 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:33 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) [ 109.332183][T10218] CPU: 1 PID: 10218 Comm: syz-executor.0 Not tainted 5.2.0+ #55 [ 109.340100][T10218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 109.350177][T10218] Call Trace: [ 109.353489][T10218] dump_stack+0x172/0x1f0 [ 109.357839][T10218] should_fail.cold+0xa/0x15 [ 109.362442][T10218] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 109.368265][T10218] ? ___might_sleep+0x163/0x280 [ 109.373129][T10218] __should_failslab+0x121/0x190 [ 109.378170][T10218] ? sock_destroy_inode+0x70/0x70 [ 109.383197][T10218] should_failslab+0x9/0x14 [ 109.387700][T10218] kmem_cache_alloc_trace+0x2ce/0x750 [ 109.393072][T10218] ? kmem_cache_alloc+0x32b/0x6f0 [ 109.398104][T10218] ? ___might_sleep+0x163/0x280 [ 109.402964][T10218] ? sock_destroy_inode+0x70/0x70 [ 109.407995][T10218] sock_alloc_inode+0x63/0x260 [ 109.412761][T10218] alloc_inode+0x68/0x1e0 [ 109.417090][T10218] new_inode_pseudo+0x19/0xf0 [ 109.421785][T10218] sock_alloc+0x41/0x270 [ 109.426044][T10218] __sock_create+0xc2/0x730 [ 109.430741][T10218] ? migrate_swap_stop+0x990/0x990 [ 109.436390][T10218] sock_create_kern+0x3b/0x50 [ 109.441176][T10218] io_uring_setup+0xc23/0x1a30 [ 109.445955][T10218] ? io_uring_release+0x50/0x50 [ 109.451809][T10218] ? fput_many+0x12c/0x1a0 [ 109.456242][T10218] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 109.461708][T10218] ? do_syscall_64+0x26/0x680 [ 109.466397][T10218] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 109.472469][T10218] ? do_syscall_64+0x26/0x680 [ 109.477152][T10218] ? lockdep_hardirqs_on+0x418/0x5d0 [ 109.482449][T10218] __x64_sys_io_uring_setup+0x54/0x80 [ 109.487849][T10218] do_syscall_64+0xfd/0x680 [ 109.492454][T10218] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 109.498344][T10218] RIP: 0033:0x4597c9 [ 109.502239][T10218] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 109.502248][T10218] RSP: 002b:00007fc883a4cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 109.502262][T10218] RAX: ffffffffffffffda RBX: 00007fc883a4cc90 RCX: 00000000004597c9 [ 109.502277][T10218] RDX: 0000000000000000 RSI: 00000000200013c0 RDI: 00000000000008a8 [ 109.547243][T10218] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 109.547253][T10218] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc883a4d6d4 [ 109.547262][T10218] R13: 00000000004c0bb0 R14: 00000000004d39c8 R15: 0000000000000003 [ 109.572728][T10218] socket: no more sockets 07:54:33 executing program 0 (fault-call:0 fault-nth:14): io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7}) 07:54:33 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:33 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:33 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:33 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:33 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:33 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:33 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:33 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:33 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) [ 109.828519][T10255] FAULT_INJECTION: forcing a failure. [ 109.828519][T10255] name failslab, interval 1, probability 0, space 0, times 0 [ 109.897145][T10255] CPU: 0 PID: 10255 Comm: syz-executor.0 Not tainted 5.2.0+ #55 [ 109.904822][T10255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 109.915319][T10255] Call Trace: [ 109.918628][T10255] dump_stack+0x172/0x1f0 [ 109.922974][T10255] should_fail.cold+0xa/0x15 [ 109.927580][T10255] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 109.933640][T10255] ? ___might_sleep+0x163/0x280 [ 109.938535][T10255] __should_failslab+0x121/0x190 [ 109.943560][T10255] should_failslab+0x9/0x14 [ 109.948064][T10255] kmem_cache_alloc+0x2af/0x6f0 [ 109.952921][T10255] ? __sock_create+0x382/0x730 [ 109.957697][T10255] sk_prot_alloc+0x67/0x2e0 [ 109.962200][T10255] sk_alloc+0x39/0xf70 [ 109.966285][T10255] unix_create1+0xc2/0x530 [ 109.970711][T10255] unix_create+0x103/0x1e0 [ 109.975140][T10255] __sock_create+0x3d8/0x730 [ 109.979734][T10255] ? migrate_swap_stop+0x990/0x990 [ 109.984854][T10255] sock_create_kern+0x3b/0x50 [ 109.989548][T10255] io_uring_setup+0xc23/0x1a30 [ 109.994329][T10255] ? io_uring_release+0x50/0x50 [ 109.999183][T10255] ? fput_many+0x12c/0x1a0 [ 110.003614][T10255] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 110.009072][T10255] ? do_syscall_64+0x26/0x680 [ 110.013762][T10255] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 110.019836][T10255] ? do_syscall_64+0x26/0x680 [ 110.024529][T10255] ? lockdep_hardirqs_on+0x418/0x5d0 [ 110.029827][T10255] __x64_sys_io_uring_setup+0x54/0x80 [ 110.035205][T10255] do_syscall_64+0xfd/0x680 [ 110.039717][T10255] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 110.045604][T10255] RIP: 0033:0x4597c9 [ 110.049503][T10255] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 110.069119][T10255] RSP: 002b:00007fc883a4cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 110.077550][T10255] RAX: ffffffffffffffda RBX: 00007fc883a4cc90 RCX: 00000000004597c9 [ 110.085530][T10255] RDX: 0000000000000000 RSI: 00000000200013c0 RDI: 00000000000008a8 07:54:34 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:34 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) [ 110.093507][T10255] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 110.101480][T10255] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc883a4d6d4 [ 110.109455][T10255] R13: 00000000004c0bb0 R14: 00000000004d39c8 R15: 0000000000000003 07:54:34 executing program 0 (fault-call:0 fault-nth:15): io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7}) 07:54:34 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:34 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:34 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:34 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:34 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:34 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:34 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:34 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:34 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) [ 110.420680][T10289] FAULT_INJECTION: forcing a failure. [ 110.420680][T10289] name failslab, interval 1, probability 0, space 0, times 0 [ 110.491544][T10289] CPU: 0 PID: 10289 Comm: syz-executor.0 Not tainted 5.2.0+ #55 [ 110.499217][T10289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.509276][T10289] Call Trace: [ 110.512580][T10289] dump_stack+0x172/0x1f0 [ 110.516933][T10289] should_fail.cold+0xa/0x15 [ 110.521535][T10289] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 110.527355][T10289] ? ___might_sleep+0x163/0x280 [ 110.532214][T10289] __should_failslab+0x121/0x190 [ 110.537153][T10289] should_failslab+0x9/0x14 [ 110.541654][T10289] kmem_cache_alloc_trace+0x2ce/0x750 [ 110.547037][T10289] ? sk_prot_alloc+0x67/0x2e0 [ 110.551729][T10289] apparmor_sk_alloc_security+0x87/0x110 [ 110.557674][T10289] security_sk_alloc+0x77/0xc0 [ 110.562454][T10289] sk_prot_alloc+0xa5/0x2e0 [ 110.566969][T10289] sk_alloc+0x39/0xf70 [ 110.571049][T10289] unix_create1+0xc2/0x530 [ 110.575473][T10289] unix_create+0x103/0x1e0 [ 110.579899][T10289] __sock_create+0x3d8/0x730 [ 110.584493][T10289] ? migrate_swap_stop+0x990/0x990 07:54:34 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:34 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) [ 110.589628][T10289] sock_create_kern+0x3b/0x50 [ 110.594318][T10289] io_uring_setup+0xc23/0x1a30 [ 110.599092][T10289] ? io_uring_release+0x50/0x50 [ 110.603960][T10289] ? fput_many+0x12c/0x1a0 [ 110.608840][T10289] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 110.614324][T10289] ? do_syscall_64+0x26/0x680 [ 110.619014][T10289] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 110.625124][T10289] ? do_syscall_64+0x26/0x680 [ 110.629821][T10289] ? lockdep_hardirqs_on+0x418/0x5d0 [ 110.635121][T10289] __x64_sys_io_uring_setup+0x54/0x80 [ 110.635141][T10289] do_syscall_64+0xfd/0x680 [ 110.635161][T10289] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 110.635180][T10289] RIP: 0033:0x4597c9 [ 110.654799][T10289] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 110.674413][T10289] RSP: 002b:00007fc883a4cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 110.682828][T10289] RAX: ffffffffffffffda RBX: 00007fc883a4cc90 RCX: 00000000004597c9 [ 110.682847][T10289] RDX: 0000000000000000 RSI: 00000000200013c0 RDI: 00000000000008a8 [ 110.698778][T10289] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 110.706757][T10289] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc883a4d6d4 [ 110.714732][T10289] R13: 00000000004c0bb0 R14: 00000000004d39c8 R15: 0000000000000003 07:54:34 executing program 0 (fault-call:0 fault-nth:16): io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7}) 07:54:34 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:34 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:34 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:34 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:34 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:35 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:35 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) [ 110.919769][T10320] FAULT_INJECTION: forcing a failure. [ 110.919769][T10320] name failslab, interval 1, probability 0, space 0, times 0 07:54:35 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) [ 110.968150][T10320] CPU: 0 PID: 10320 Comm: syz-executor.0 Not tainted 5.2.0+ #55 [ 110.975819][T10320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.975826][T10320] Call Trace: [ 110.975850][T10320] dump_stack+0x172/0x1f0 [ 110.975877][T10320] should_fail.cold+0xa/0x15 [ 110.975898][T10320] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 110.975920][T10320] ? ___might_sleep+0x163/0x280 [ 110.975941][T10320] __should_failslab+0x121/0x190 [ 110.975959][T10320] should_failslab+0x9/0x14 [ 110.975972][T10320] kmem_cache_alloc+0x2af/0x6f0 [ 110.975994][T10320] ? find_held_lock+0x35/0x130 [ 111.027870][T10320] ? __alloc_fd+0x44d/0x560 [ 111.032398][T10320] __d_alloc+0x2e/0x8c0 [ 111.036653][T10320] d_alloc_pseudo+0x1e/0x70 [ 111.041158][T10320] alloc_file_pseudo+0xe2/0x280 [ 111.041177][T10320] ? alloc_file+0x4d0/0x4d0 [ 111.041196][T10320] ? _raw_spin_unlock+0x2d/0x50 [ 111.041215][T10320] ? __alloc_fd+0x44d/0x560 [ 111.059881][T10320] anon_inode_getfile+0xda/0x200 [ 111.064828][T10320] io_uring_setup+0xc78/0x1a30 [ 111.069604][T10320] ? io_uring_release+0x50/0x50 [ 111.074459][T10320] ? fput_many+0x12c/0x1a0 [ 111.078894][T10320] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 111.084356][T10320] ? do_syscall_64+0x26/0x680 [ 111.089039][T10320] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 111.095108][T10320] ? do_syscall_64+0x26/0x680 [ 111.099797][T10320] ? lockdep_hardirqs_on+0x418/0x5d0 [ 111.099821][T10320] __x64_sys_io_uring_setup+0x54/0x80 [ 111.099838][T10320] do_syscall_64+0xfd/0x680 [ 111.099860][T10320] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 111.120857][T10320] RIP: 0033:0x4597c9 [ 111.124756][T10320] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 111.144447][T10320] RSP: 002b:00007fc883a4cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 111.144462][T10320] RAX: ffffffffffffffda RBX: 00007fc883a4cc90 RCX: 00000000004597c9 [ 111.144470][T10320] RDX: 0000000000000000 RSI: 00000000200013c0 RDI: 00000000000008a8 07:54:35 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:35 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) [ 111.144479][T10320] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 111.144488][T10320] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc883a4d6d4 [ 111.144496][T10320] R13: 00000000004c0bb0 R14: 00000000004d39c8 R15: 0000000000000003 07:54:35 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:35 executing program 0 (fault-call:0 fault-nth:17): io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7}) 07:54:35 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:35 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:35 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:35 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:35 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:35 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) [ 111.506118][T10353] FAULT_INJECTION: forcing a failure. [ 111.506118][T10353] name failslab, interval 1, probability 0, space 0, times 0 [ 111.580986][T10353] CPU: 1 PID: 10353 Comm: syz-executor.0 Not tainted 5.2.0+ #55 [ 111.588670][T10353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 111.598738][T10353] Call Trace: [ 111.602047][T10353] dump_stack+0x172/0x1f0 [ 111.606401][T10353] should_fail.cold+0xa/0x15 [ 111.611005][T10353] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 111.616828][T10353] ? ___might_sleep+0x163/0x280 [ 111.621690][T10353] __should_failslab+0x121/0x190 [ 111.626640][T10353] should_failslab+0x9/0x14 [ 111.631161][T10353] kmem_cache_alloc+0x2af/0x6f0 [ 111.637199][T10353] ? rwlock_bug.part.0+0x90/0x90 [ 111.642151][T10353] ? lock_downgrade+0x920/0x920 [ 111.647012][T10353] __alloc_file+0x27/0x300 [ 111.651435][T10353] alloc_empty_file+0x72/0x170 [ 111.656210][T10353] alloc_file+0x5e/0x4d0 [ 111.660464][T10353] alloc_file_pseudo+0x189/0x280 [ 111.665409][T10353] ? alloc_file+0x4d0/0x4d0 [ 111.669916][T10353] ? _raw_spin_unlock+0x2d/0x50 [ 111.674780][T10353] anon_inode_getfile+0xda/0x200 [ 111.679739][T10353] io_uring_setup+0xc78/0x1a30 [ 111.684508][T10353] ? io_uring_release+0x50/0x50 [ 111.684524][T10353] ? fput_many+0x12c/0x1a0 [ 111.684555][T10353] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 111.699249][T10353] ? do_syscall_64+0x26/0x680 [ 111.703937][T10353] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 111.710005][T10353] ? do_syscall_64+0x26/0x680 [ 111.714779][T10353] ? lockdep_hardirqs_on+0x418/0x5d0 [ 111.720171][T10353] __x64_sys_io_uring_setup+0x54/0x80 [ 111.725562][T10353] do_syscall_64+0xfd/0x680 07:54:35 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:35 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) [ 111.730087][T10353] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 111.736938][T10353] RIP: 0033:0x4597c9 [ 111.740834][T10353] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 111.760445][T10353] RSP: 002b:00007fc883a4cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 111.768858][T10353] RAX: ffffffffffffffda RBX: 00007fc883a4cc90 RCX: 00000000004597c9 07:54:35 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:35 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:35 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) [ 111.776826][T10353] RDX: 0000000000000000 RSI: 00000000200013c0 RDI: 00000000000008a8 [ 111.776835][T10353] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 111.776843][T10353] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc883a4d6d4 [ 111.776850][T10353] R13: 00000000004c0bb0 R14: 00000000004d39c8 R15: 0000000000000003 07:54:36 executing program 0 (fault-call:0 fault-nth:18): io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7}) 07:54:36 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:36 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:36 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:36 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:36 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:36 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:36 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:36 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) [ 112.096177][T10390] FAULT_INJECTION: forcing a failure. [ 112.096177][T10390] name failslab, interval 1, probability 0, space 0, times 0 [ 112.119419][T10390] CPU: 0 PID: 10390 Comm: syz-executor.0 Not tainted 5.2.0+ #55 [ 112.127081][T10390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 112.127096][T10390] Call Trace: [ 112.140971][T10390] dump_stack+0x172/0x1f0 [ 112.145313][T10390] should_fail.cold+0xa/0x15 [ 112.149917][T10390] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 112.155736][T10390] ? ___might_sleep+0x163/0x280 [ 112.160601][T10390] __should_failslab+0x121/0x190 [ 112.165547][T10390] should_failslab+0x9/0x14 [ 112.170062][T10390] kmem_cache_alloc+0x2af/0x6f0 [ 112.174930][T10390] ? rcu_read_lock_sched_held+0x110/0x130 [ 112.180660][T10390] ? kmem_cache_alloc+0x32b/0x6f0 [ 112.185693][T10390] security_file_alloc+0x39/0x170 [ 112.190729][T10390] __alloc_file+0xac/0x300 07:54:36 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) [ 112.195155][T10390] alloc_empty_file+0x72/0x170 [ 112.199922][T10390] alloc_file+0x5e/0x4d0 [ 112.204167][T10390] alloc_file_pseudo+0x189/0x280 [ 112.204185][T10390] ? alloc_file+0x4d0/0x4d0 [ 112.204207][T10390] ? _raw_spin_unlock+0x2d/0x50 [ 112.218476][T10390] anon_inode_getfile+0xda/0x200 [ 112.223422][T10390] io_uring_setup+0xc78/0x1a30 [ 112.228200][T10390] ? io_uring_release+0x50/0x50 [ 112.233064][T10390] ? fput_many+0x12c/0x1a0 [ 112.237501][T10390] ? trace_hardirqs_on_thunk+0x1a/0x1c 07:54:36 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) [ 112.242969][T10390] ? do_syscall_64+0x26/0x680 [ 112.247648][T10390] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 112.253712][T10390] ? do_syscall_64+0x26/0x680 [ 112.253730][T10390] ? lockdep_hardirqs_on+0x418/0x5d0 [ 112.253752][T10390] __x64_sys_io_uring_setup+0x54/0x80 [ 112.253768][T10390] do_syscall_64+0xfd/0x680 [ 112.253785][T10390] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 112.253797][T10390] RIP: 0033:0x4597c9 [ 112.253817][T10390] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 112.303121][T10390] RSP: 002b:00007fc883a4cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 112.311595][T10390] RAX: ffffffffffffffda RBX: 00007fc883a4cc90 RCX: 00000000004597c9 [ 112.319634][T10390] RDX: 0000000000000000 RSI: 00000000200013c0 RDI: 00000000000008a8 [ 112.327606][T10390] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 112.335581][T10390] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc883a4d6d4 07:54:36 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) [ 112.343577][T10390] R13: 00000000004c0bb0 R14: 00000000004d39c8 R15: 0000000000000003 07:54:36 executing program 0 (fault-call:0 fault-nth:19): io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7}) 07:54:36 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:36 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:36 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:36 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:36 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:36 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:36 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:36 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:36 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:36 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7}) 07:54:36 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:36 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:37 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:37 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:37 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:37 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:37 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:37 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:37 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x2, 0x0, 0x7}) 07:54:37 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:37 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:37 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:37 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:37 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:37 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:37 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x3, 0x0, 0x7}) 07:54:37 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:37 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:37 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:37 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:37 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:37 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:37 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:37 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:37 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x4, 0x0, 0x7}) 07:54:37 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:37 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:38 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:38 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:38 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:38 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:38 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x5, 0x0, 0x7}) 07:54:38 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:38 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:38 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:38 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:38 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:38 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x6, 0x0, 0x7}) 07:54:38 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:38 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:38 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:38 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:38 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:38 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x7, 0x0, 0x7}) 07:54:38 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:38 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:38 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:38 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:38 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:38 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:38 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x300, 0x0, 0x7}) 07:54:38 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:39 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:39 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:39 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:39 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:39 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:39 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:39 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:39 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:39 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x500, 0x0, 0x7}) 07:54:39 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:39 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:39 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:39 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:39 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:39 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:39 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:39 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x600, 0x0, 0x7}) 07:54:39 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:39 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:39 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:39 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:39 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:39 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:40 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:40 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:40 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x700, 0x0, 0x7}) 07:54:40 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:40 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:40 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:40 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:40 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:40 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x3f00, 0x0, 0x7}) 07:54:40 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:40 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:40 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:40 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:40 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:40 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:40 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:40 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:40 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x4000, 0x0, 0x7}) 07:54:40 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:40 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:40 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:40 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:40 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:40 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:40 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:41 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x400000, 0x0, 0x7}) 07:54:41 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:41 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:41 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:41 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:41 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:41 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:41 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:41 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:41 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x80ffff, 0x0, 0x7}) 07:54:41 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:41 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:41 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:41 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:41 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:41 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x1000000, 0x0, 0x7}) 07:54:41 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:41 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:41 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:41 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:41 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:41 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:41 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:41 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x2000000, 0x0, 0x7}) 07:54:42 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:42 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:42 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:42 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:42 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:42 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x3000000, 0x0, 0x7}) 07:54:42 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:42 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:42 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:42 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:42 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:42 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:42 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:42 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:42 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:42 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x4000000, 0x0, 0x7}) 07:54:42 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:42 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:42 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:42 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:42 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:42 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:42 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:42 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x5000000, 0x0, 0x7}) 07:54:43 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:43 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:43 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:43 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:43 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:43 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:43 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:43 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x6000000, 0x0, 0x7}) 07:54:43 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:43 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:43 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:43 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:43 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:43 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x7000000, 0x0, 0x7}) 07:54:43 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:43 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:43 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:43 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:43 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:43 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:43 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x3f000000, 0x0, 0x7}) 07:54:43 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:43 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:43 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:43 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:44 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:44 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:44 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:44 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x40000000, 0x0, 0x7}) 07:54:44 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:44 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:44 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:44 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:44 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:44 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:44 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0xfeffffff, 0x0, 0x7}) 07:54:44 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:44 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:44 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:44 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:44 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:44 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:44 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0xffff8000, 0x0, 0x7}) 07:54:44 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:44 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:44 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:44 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:44 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:44 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:44 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:44 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0xffffff7f, 0x0, 0x7}) 07:54:45 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:45 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:45 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:45 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:45 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:45 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:45 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:45 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:45 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0xfffffffe, 0x0, 0x7}) 07:54:45 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:45 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:45 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:45 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:45 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:45 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:45 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:45 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x1000000000000, 0x0, 0x7}) 07:54:45 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:45 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:45 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:45 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:45 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:45 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:45 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x40000000000000, 0x0, 0x7}) 07:54:46 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:46 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:46 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:46 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:46 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:46 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x80ffff00000000, 0x0, 0x7}) 07:54:46 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:46 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:46 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:46 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:46 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:46 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:46 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:46 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x100000000000000, 0x0, 0x7}) 07:54:46 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:46 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:46 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:46 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:46 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:46 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:46 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x200000000000000, 0x0, 0x7}) 07:54:46 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:46 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:46 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:47 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:47 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:47 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:47 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:47 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:47 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:47 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:47 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:47 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x300000000000000, 0x0, 0x7}) 07:54:47 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:47 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:47 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:47 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:47 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:47 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x400000000000000, 0x0, 0x7}) 07:54:47 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:47 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:47 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:47 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:47 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:47 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:47 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:47 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:47 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x500000000000000, 0x0, 0x7}) 07:54:47 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:48 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:48 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:48 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:48 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:48 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:48 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x600000000000000, 0x0, 0x7}) 07:54:48 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:48 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:48 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:48 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:48 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:48 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:48 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:48 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:48 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x700000000000000, 0x0, 0x7}) 07:54:48 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:48 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:48 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:48 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:48 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:48 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x3f00000000000000, 0x0, 0x7}) 07:54:48 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:48 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:48 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:49 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:49 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:49 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:49 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:49 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:49 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:49 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:49 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x4000000000000000, 0x0, 0x7}) 07:54:49 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:49 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:49 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:49 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:49 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:49 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:49 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:49 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:49 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:49 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0xfeffffff00000000, 0x0, 0x7}) 07:54:49 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:49 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:49 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:49 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:49 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:49 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:50 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:50 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:50 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0xffffff7f00000000, 0x0, 0x7}) 07:54:50 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:50 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:50 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:50 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:50 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:50 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:50 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0xffffffff00000000, 0x0, 0x7}) 07:54:50 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:50 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:50 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:50 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:50 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:50 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:50 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:50 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:50 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:50 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x2, 0x7}) 07:54:50 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:50 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:50 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:50 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:50 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:51 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x3, 0x7}) 07:54:51 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:51 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:51 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:51 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:51 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:51 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:51 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:51 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x4, 0x7}) 07:54:51 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:51 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:51 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:51 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:51 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:51 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:51 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x5, 0x7}) 07:54:51 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:51 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:51 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:51 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:51 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:51 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:51 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:52 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x6, 0x7}) 07:54:52 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:52 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:52 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:52 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:52 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:52 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x7, 0x7}) 07:54:52 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:52 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:52 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:52 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:52 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:52 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:52 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x300, 0x7}) 07:54:52 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:52 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:52 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:52 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:52 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:52 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:52 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x500, 0x7}) 07:54:52 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:52 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:52 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:52 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:52 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:53 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:53 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x600, 0x7}) 07:54:53 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:53 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:53 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:53 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:53 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:53 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:53 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:53 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x700, 0x7}) 07:54:53 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:53 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:53 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:53 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:53 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:53 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:53 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:53 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x3f00, 0x7}) 07:54:53 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:53 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:53 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:53 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:53 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:53 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:53 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:54 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:54 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:54 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x4000, 0x7}) 07:54:54 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:54 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:54 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:54 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:54 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:54 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x400000, 0x7}) 07:54:54 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:54 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:54 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:54 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:54 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:54 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:54 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:54 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:54 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x80ffff, 0x7}) 07:54:54 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:54 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:54 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:54 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:54 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:54 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:54 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:55 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:55 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x1000000, 0x7}) 07:54:55 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:55 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:55 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:55 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:55 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:55 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:55 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x2000000, 0x7}) 07:54:55 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:55 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:55 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:55 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:55 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:55 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:55 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x3000000, 0x7}) 07:54:55 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:55 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:55 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:55 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:55 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:55 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:55 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x4000000, 0x7}) 07:54:55 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:56 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:56 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:56 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:56 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:56 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:56 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x5000000, 0x7}) 07:54:56 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:56 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:56 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:56 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:56 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:56 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:56 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:56 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:56 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:56 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x6000000, 0x7}) 07:54:56 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:56 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:56 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:56 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:56 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:56 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:56 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x7000000, 0x7}) 07:54:56 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:57 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:57 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:57 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:57 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:57 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:57 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x3f000000, 0x7}) 07:54:57 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:57 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:57 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:57 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:57 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:57 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:57 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x40000000, 0x7}) 07:54:57 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:57 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:57 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:57 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:57 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:57 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:57 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:57 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0xfeffffff, 0x7}) 07:54:57 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:57 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:57 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:57 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:57 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:58 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:58 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:58 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:58 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:58 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:58 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0xffff8000, 0x7}) 07:54:58 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:58 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:58 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:58 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:58 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:58 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:58 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0xffffff7f, 0x7}) 07:54:58 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:58 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:58 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:58 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:58 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:58 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:58 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:58 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:58 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0xfffffffe, 0x7}) 07:54:58 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:59 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:59 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:59 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:59 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:59 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:59 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:59 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x1000000000000, 0x7}) 07:54:59 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:59 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:59 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:59 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:59 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:59 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x40000000000000, 0x7}) 07:54:59 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:59 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:59 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:54:59 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:59 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:54:59 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:54:59 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:59 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x80ffff00000000, 0x7}) 07:54:59 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:59 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:54:59 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:00 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:00 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:00 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x100000000000000, 0x7}) 07:55:00 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:00 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:00 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:00 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:00 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:00 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:00 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:00 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:00 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:00 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x200000000000000, 0x7}) 07:55:00 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:00 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:00 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:00 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:00 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:00 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:00 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:00 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x300000000000000, 0x7}) 07:55:00 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:00 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:00 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:01 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:01 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:01 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x400000000000000, 0x7}) 07:55:01 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:01 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:01 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:01 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:01 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:01 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:01 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x500000000000000, 0x7}) 07:55:01 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:01 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:01 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:01 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:01 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:01 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:01 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x600000000000000, 0x7}) 07:55:01 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:01 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:01 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:01 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:01 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:01 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:02 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:02 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:02 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:02 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x700000000000000, 0x7}) 07:55:02 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:02 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:02 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:02 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:02 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:02 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:02 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:02 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:02 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x3f00000000000000, 0x7}) 07:55:02 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:02 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:02 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:02 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:02 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:02 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:02 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:02 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:02 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x4000000000000000, 0x7}) 07:55:03 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:03 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:03 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:03 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:03 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0xfeffffff00000000, 0x7}) 07:55:03 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:03 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:03 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:03 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:03 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:03 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:03 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:03 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:03 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:03 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:03 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:03 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0xffffff7f00000000, 0x7}) 07:55:03 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:03 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:03 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:03 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:03 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:03 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0xffffffff00000000, 0x7}) 07:55:03 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:03 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:04 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:04 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:04 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x14}) 07:55:04 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:04 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:04 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:04 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:04 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:04 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:04 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:04 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x2}) 07:55:04 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:04 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:04 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:04 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:04 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x3}) 07:55:04 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:04 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:04 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:04 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:04 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:04 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x4}) 07:55:04 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:04 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:04 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:04 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:05 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:05 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x5}) 07:55:05 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:05 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:05 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:05 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:05 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:05 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:05 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:05 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:05 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x6}) 07:55:05 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:05 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:05 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:05 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:05 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:05 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:05 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x7}) 07:55:05 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:05 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:05 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:05 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:06 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:06 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:06 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:06 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x300}) 07:55:06 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:06 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:06 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:06 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:06 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:06 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:06 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x500}) 07:55:06 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:06 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:06 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:06 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:06 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:06 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x600}) 07:55:06 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:06 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:06 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:06 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:06 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:06 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:06 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:06 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:07 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x700}) 07:55:07 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:07 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:07 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:07 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:07 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:07 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x3f00}) 07:55:07 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:07 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:07 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:07 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:07 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:07 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x4000}) 07:55:07 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:07 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:07 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:07 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:07 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:07 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:07 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x400000}) 07:55:07 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:07 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:07 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:08 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:08 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:08 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x80ffff}) 07:55:08 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:08 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:08 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:08 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:08 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:08 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:08 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:08 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x1000000}) 07:55:08 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:08 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:08 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:08 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:08 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:08 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x2000000}) 07:55:08 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:08 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:08 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:08 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:08 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:08 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:08 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:08 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x3000000}) 07:55:09 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:09 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:09 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:09 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:09 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:09 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:09 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x4000000}) 07:55:09 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:09 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:09 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:09 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:09 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:09 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:09 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:09 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:09 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x5000000}) 07:55:09 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:09 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:09 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:09 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:09 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:09 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:09 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x6000000}) 07:55:09 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:10 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:10 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:10 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:10 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:10 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:10 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x7000000}) 07:55:10 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:10 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:10 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:10 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:10 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:10 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:10 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:10 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x3f000000}) 07:55:10 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:10 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:10 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:10 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:10 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:10 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x40000000}) 07:55:10 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:10 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:10 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:10 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:11 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:11 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0xfeffffff}) 07:55:11 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:11 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:11 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:11 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:11 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:11 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:11 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:11 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0xffff8000}) 07:55:11 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:11 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:11 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:11 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:11 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:11 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:11 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0xffffff7f}) 07:55:11 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:11 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:11 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:11 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:11 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:11 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0xfffffffe}) 07:55:11 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:12 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:12 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:12 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:12 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:12 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:12 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:12 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:12 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:12 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x1000000000000}) 07:55:12 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:12 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:12 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:12 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:12 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:12 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x40000000000000}) 07:55:12 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:12 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:12 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:12 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:12 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:12 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x80ffff00000000}) 07:55:12 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:12 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:12 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:13 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:13 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:13 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:13 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:13 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:13 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x100000000000000}) 07:55:13 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:13 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:13 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:13 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:13 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:13 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:13 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:13 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:13 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:13 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:13 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x200000000000000}) 07:55:13 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:13 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:13 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:13 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:13 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:13 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:13 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x300000000000000}) 07:55:13 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:13 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:14 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:14 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:14 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:14 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:14 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x400000000000000}) 07:55:14 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:14 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:14 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:14 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:14 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:14 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:14 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:14 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:14 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x500000000000000}) 07:55:14 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:14 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:14 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:14 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:14 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:14 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x600000000000000}) 07:55:15 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:15 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:15 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:15 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:15 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:15 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:15 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:15 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:15 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:15 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:15 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:15 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x700000000000000}) 07:55:15 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:15 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:15 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:15 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:15 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:15 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:15 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x3f00000000000000}) 07:55:15 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:15 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:15 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:15 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:16 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:16 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:16 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:16 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:16 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:16 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x4000000000000000}) 07:55:16 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:16 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:16 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:16 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:16 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:16 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:16 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:16 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0xfeffffff00000000}) 07:55:16 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:16 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:16 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:16 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:16 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:16 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:16 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:16 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0xffffff7f00000000}) 07:55:16 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:16 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:16 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:16 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:17 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:17 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:17 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:17 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0xffffffff00000000}) 07:55:17 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:17 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:17 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:17 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:17 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:17 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:17 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:17 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x2}) 07:55:17 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:17 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:17 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:17 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:17 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:17 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:17 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:17 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x3}) 07:55:17 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:17 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:18 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:18 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:18 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:18 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:18 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x4}) 07:55:18 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:18 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:18 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:18 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:18 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:18 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:18 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x5}) 07:55:18 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:18 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:18 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:18 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:18 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:18 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:18 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x6}) 07:55:18 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:18 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:18 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:18 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:18 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:19 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:19 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x7}) 07:55:19 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:19 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:19 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:19 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:19 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:19 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:19 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:19 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:19 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x300}) 07:55:19 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:19 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:19 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:19 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:19 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x500}) 07:55:19 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:19 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:19 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:19 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:19 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:19 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x600}) 07:55:20 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:20 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:20 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:20 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:20 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:20 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:20 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:20 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x700}) 07:55:20 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:20 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:20 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:20 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:20 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:20 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:20 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x3f00}) 07:55:20 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:20 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:20 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:20 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:20 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:20 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x4000}) 07:55:20 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:20 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:20 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:20 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:20 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:21 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:21 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x400000}) 07:55:21 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:21 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:21 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:21 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:21 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:21 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:21 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:21 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:21 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:21 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:21 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x80ffff}) 07:55:21 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:21 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:21 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:21 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:21 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:21 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x1000000}) 07:55:21 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:21 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:21 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:21 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:21 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:22 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:22 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:22 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:22 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x2000000}) 07:55:22 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:22 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:22 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:22 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:22 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:22 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:22 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:22 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:22 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:22 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:22 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:22 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x3000000}) 07:55:22 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:22 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:22 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:22 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:22 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:22 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x4000000}) 07:55:22 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:22 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:23 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:23 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:23 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:23 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:23 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:23 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:23 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x5000000}) 07:55:23 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:23 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:23 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:23 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:23 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:23 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:23 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x6000000}) 07:55:23 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:23 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:23 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:23 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:23 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:23 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x7000000}) 07:55:23 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:23 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:23 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:23 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:23 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:24 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:24 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x3f000000}) 07:55:24 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:24 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:24 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:24 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:24 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:24 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:24 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:24 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:24 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:24 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:24 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x40000000}) 07:55:24 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:24 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:24 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:24 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:24 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:24 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:24 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0xfeffffff}) 07:55:24 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:24 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:24 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:25 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:25 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:25 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:25 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:25 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0xffff8000}) 07:55:25 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:25 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:25 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:25 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:25 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:25 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:25 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0xffffff7f}) 07:55:25 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:25 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:25 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:25 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:25 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:25 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:25 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0xfffffffe}) 07:55:25 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:25 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:25 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:25 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:25 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:26 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:26 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:26 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:26 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:26 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:26 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:26 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x1000000000000}) 07:55:26 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:26 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:26 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:26 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:26 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:26 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:26 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:26 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x40000000000000}) 07:55:26 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:26 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:26 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:26 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:26 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:26 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:26 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:26 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x80ffff00000000}) 07:55:26 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:27 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:27 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:27 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:27 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:27 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:27 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:27 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:27 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x100000000000000}) 07:55:27 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:27 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:27 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:27 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:27 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:27 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:27 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x200000000000000}) 07:55:27 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:27 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:27 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:27 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:27 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:27 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:27 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x300000000000000}) 07:55:27 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:28 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:28 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:28 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:28 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:28 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:28 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:28 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x400000000000000}) 07:55:28 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:28 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:28 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:28 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:28 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:28 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:28 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:28 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:28 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x500000000000000}) 07:55:28 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:28 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:28 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:28 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:28 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:28 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:28 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x600000000000000}) 07:55:28 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:29 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:29 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:29 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:29 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:29 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:29 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x700000000000000}) 07:55:29 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:29 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:29 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:29 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:29 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:29 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:29 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:29 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x3f00000000000000}) 07:55:29 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:29 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:29 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:29 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:29 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:29 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:29 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x4000000000000000}) 07:55:29 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:29 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:30 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:30 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:30 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:30 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:30 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0xfeffffff00000000}) 07:55:30 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:30 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:30 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:30 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:30 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:30 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:30 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0xffffff7f00000000}) 07:55:30 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:30 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:30 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:30 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:30 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:30 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:30 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:30 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:30 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:30 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0xffffffff00000000}) 07:55:31 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:31 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:31 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:31 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:31 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x2]}) 07:55:31 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:31 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:31 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:31 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:31 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:31 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x3]}) 07:55:31 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:31 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:31 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:31 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:31 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x4]}) 07:55:31 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:31 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:31 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:31 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:31 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:31 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x5]}) 07:55:31 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:31 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:32 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:32 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:32 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:32 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x6]}) 07:55:32 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:32 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:32 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:32 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:32 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x7]}) 07:55:32 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:32 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:32 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:32 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:32 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:32 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x300]}) 07:55:32 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:32 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:32 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:32 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:32 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:32 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:32 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x500]}) 07:55:32 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:33 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:33 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:33 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:33 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:33 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x600]}) 07:55:33 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:33 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:33 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:33 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:33 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:33 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x700]}) 07:55:33 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:33 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:33 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:33 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:33 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:33 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:33 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:33 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x3f00]}) 07:55:33 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:33 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:33 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:33 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:33 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:33 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:33 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x4000]}) 07:55:34 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:34 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:34 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:34 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:34 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x400000]}) 07:55:34 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:34 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:34 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:34 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:34 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:34 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x80ffff]}) 07:55:34 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:34 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:34 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:34 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x1000000]}) 07:55:34 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:34 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:34 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:34 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:34 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:34 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x2000000]}) 07:55:34 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:34 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:35 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:35 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:35 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:35 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x3000000]}) 07:55:35 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:35 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:35 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:35 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:35 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:35 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x4000000]}) 07:55:35 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:35 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:35 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:35 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x5000000]}) 07:55:35 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:35 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:35 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:35 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:35 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:35 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:35 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:35 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:35 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:35 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:35 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x6000000]}) 07:55:36 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:36 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:36 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:36 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x7000000]}) 07:55:36 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:36 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:36 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:36 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:36 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:36 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:36 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:36 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x3f000000]}) 07:55:36 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:36 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:36 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:36 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:36 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:36 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x40000000]}) 07:55:36 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:36 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:36 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:37 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:37 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:37 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0xfeffffff]}) 07:55:37 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:37 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:37 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:37 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:37 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:37 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:37 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0xffff8000]}) 07:55:37 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:37 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:37 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:37 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:37 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0xffffff7f]}) 07:55:37 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:37 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:37 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:37 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:37 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:37 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:37 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0xfffffffe]}) 07:55:37 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:37 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:37 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:38 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x1000000000000]}) 07:55:38 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:38 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:38 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:38 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:38 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:38 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:38 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x40000000000000]}) 07:55:38 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:38 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:38 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:38 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:38 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:38 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:38 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:38 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:38 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x80ffff00000000]}) 07:55:38 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:38 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:38 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:38 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:38 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:38 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:38 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x100000000000000]}) 07:55:39 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:39 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:39 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:39 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:39 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:39 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:39 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:39 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:39 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x200000000000000]}) 07:55:39 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:39 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:39 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:39 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:39 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:39 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x300000000000000]}) 07:55:39 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:39 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:39 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:39 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:39 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:39 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:39 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x400000000000000]}) 07:55:39 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:39 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:40 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:40 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:40 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:40 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x500000000000000]}) 07:55:40 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:40 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:40 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:40 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:40 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:40 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:40 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:40 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:40 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:40 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x600000000000000]}) 07:55:40 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:40 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:40 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:40 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:40 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:40 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x700000000000000]}) 07:55:40 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:40 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:40 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:40 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:40 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:41 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:41 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:41 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:41 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:41 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:41 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x3f00000000000000]}) 07:55:41 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:41 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:41 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:41 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:41 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:41 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:41 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:41 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:41 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:41 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x4000000000000000]}) 07:55:41 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:41 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:41 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:41 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:41 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:41 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0xfeffffff00000000]}) 07:55:41 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:41 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:41 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:42 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:42 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:42 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:42 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:42 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0xffffff7f00000000]}) 07:55:42 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:42 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:42 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:42 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:42 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:42 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:42 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0xffffffff00000000]}) 07:55:42 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:42 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:42 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:42 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:42 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:42 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x2]}) 07:55:42 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:42 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:42 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:42 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:42 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x3]}) 07:55:42 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:43 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:43 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:43 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:43 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:43 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x4]}) 07:55:43 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:43 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:43 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:43 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:43 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x5]}) 07:55:43 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:43 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:43 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:43 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:43 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:43 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x6]}) 07:55:43 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:43 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:43 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:43 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:43 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:43 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x7]}) 07:55:43 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:43 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:44 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:44 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x300]}) 07:55:44 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:44 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:44 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:44 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:44 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:44 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x500]}) 07:55:44 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:44 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:44 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:44 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:44 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:44 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x600]}) 07:55:44 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:44 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:44 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:44 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:44 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:44 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x700]}) 07:55:44 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:44 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:44 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:45 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:45 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:45 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x3f00]}) 07:55:45 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:45 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:45 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:45 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x4000]}) 07:55:45 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:45 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:45 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:45 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:45 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:45 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x400000]}) 07:55:45 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:45 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:45 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:45 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:45 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:45 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x80ffff]}) 07:55:45 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:45 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:45 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:45 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:45 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x1000000]}) 07:55:45 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:46 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:46 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:46 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:46 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:46 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x2000000]}) 07:55:46 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:46 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:46 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:46 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:46 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:46 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:46 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:46 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x3000000]}) 07:55:46 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:46 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:46 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:46 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:46 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:46 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:46 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:46 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x4000000]}) 07:55:46 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:46 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:46 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:47 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:47 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:47 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x5000000]}) 07:55:47 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:47 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:47 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:47 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:47 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:47 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:47 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:47 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x6000000]}) 07:55:47 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:47 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:47 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:47 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:47 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:47 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x7000000]}) 07:55:47 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:47 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:47 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:47 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:47 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:47 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:47 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:48 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x3f000000]}) 07:55:48 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:48 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:48 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:48 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:48 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x40000000]}) 07:55:48 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:48 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:48 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:48 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:48 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:48 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0xfeffffff]}) 07:55:48 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:48 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:48 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:48 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:48 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0xffff8000]}) 07:55:48 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:48 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:48 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:48 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0xffffff7f]}) 07:55:48 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:48 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:48 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:48 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:49 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:49 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0xfffffffe]}) 07:55:49 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:49 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:49 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:49 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:49 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:49 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:49 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:49 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x1000000000000]}) 07:55:49 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:49 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:49 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:49 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:49 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:49 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:49 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x40000000000000]}) 07:55:49 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:49 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:49 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:49 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:49 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:50 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:50 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:50 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:50 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x80ffff00000000]}) 07:55:50 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:50 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:50 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:50 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:50 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:50 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:50 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:50 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x100000000000000]}) 07:55:50 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:50 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:50 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:50 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:50 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:50 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x200000000000000]}) 07:55:50 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:50 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:50 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:50 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:50 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:50 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:51 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:51 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:51 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:51 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x300000000000000]}) 07:55:51 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:51 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:51 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:51 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:51 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:51 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:51 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x400000000000000]}) 07:55:51 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:51 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:51 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:51 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:51 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:51 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:51 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x500000000000000]}) 07:55:51 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:51 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:51 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:51 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:51 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:52 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:52 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:52 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x600000000000000]}) 07:55:52 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:52 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:52 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:52 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:52 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:52 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:52 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:52 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x700000000000000]}) 07:55:52 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:52 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:52 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:52 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:52 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x3f00000000000000]}) 07:55:52 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:52 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:52 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:52 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:52 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:52 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:52 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:52 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x4000000000000000]}) 07:55:52 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:53 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:53 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:53 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:53 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:53 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:53 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:53 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0xfeffffff00000000]}) 07:55:53 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:53 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:53 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:53 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:53 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:53 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:53 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:53 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:53 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0xffffff7f00000000]}) 07:55:53 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:53 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:53 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:53 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:53 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:53 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:54 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0xffffffff00000000]}) 07:55:54 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:54 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:54 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:54 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:54 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:54 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:54 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:54 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x2]}) 07:55:54 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:54 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:54 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:54 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:54 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:54 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:54 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:54 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:54 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:54 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x3]}) 07:55:54 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:54 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:54 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:54 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:54 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x4]}) 07:55:54 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:55 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:55 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:55 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:55 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x5]}) 07:55:55 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:55 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:55 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:55 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:55 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:55 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x6]}) 07:55:55 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:55 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:55 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:55 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:55 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:55 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x7]}) 07:55:55 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:55 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:55 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:55 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:55 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x300]}) 07:55:55 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:56 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:56 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:56 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:56 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:56 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x500]}) 07:55:56 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:56 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:56 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:56 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:56 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x600]}) 07:55:56 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:56 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:56 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:56 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:56 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:56 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x700]}) 07:55:56 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:56 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:56 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:56 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:56 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:56 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:56 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x3f00]}) 07:55:57 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:57 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:57 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:57 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:57 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x4000]}) 07:55:57 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:57 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:57 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:57 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:57 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x400000]}) 07:55:57 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:57 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:57 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:57 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:57 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x80ffff]}) 07:55:57 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:57 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:57 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:57 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:57 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:57 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x1000000]}) 07:55:57 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:57 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:57 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:58 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:58 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:58 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:58 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x2000000]}) 07:55:58 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:58 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:58 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:58 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:58 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:58 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x3000000]}) 07:55:58 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:58 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:58 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:58 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:58 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:58 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:58 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:58 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x4000000]}) 07:55:58 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:58 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:58 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:58 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:58 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:58 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x5000000]}) 07:55:58 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:59 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:59 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:59 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:59 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:59 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x6000000]}) 07:55:59 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:59 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:59 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:59 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:59 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:59 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x7000000]}) 07:55:59 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:59 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:59 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:59 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:59 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x3f000000]}) 07:55:59 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:55:59 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:59 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:55:59 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:55:59 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:55:59 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x40000000]}) 07:56:00 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:00 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:00 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:00 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:00 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:00 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0xfeffffff]}) 07:56:00 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:00 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:00 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:00 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:00 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:00 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0xffff8000]}) 07:56:00 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:00 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:00 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:00 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:00 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0xffffff7f]}) 07:56:00 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:00 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:00 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:00 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:00 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0xfffffffe]}) 07:56:00 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:00 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:00 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:01 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:01 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:01 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:01 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x1000000000000]}) 07:56:01 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:01 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:01 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:01 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:01 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:01 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:01 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:01 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:01 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:01 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:01 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x40000000000000]}) 07:56:01 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:01 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:01 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:01 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:01 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:01 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x80ffff00000000]}) 07:56:01 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:02 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:02 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:02 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:02 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:02 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x100000000000000]}) 07:56:02 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:02 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:02 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:02 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:02 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:02 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:02 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:02 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x200000000000000]}) 07:56:02 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:02 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:02 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:02 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:02 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:02 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:02 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:02 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:02 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x300000000000000]}) 07:56:03 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:03 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:03 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:03 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:03 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:03 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:03 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:03 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:03 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:03 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:03 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x400000000000000]}) 07:56:03 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:03 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:03 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:03 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:03 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:03 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:03 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:03 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x500000000000000]}) 07:56:03 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:03 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:03 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:03 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:03 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:04 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:04 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x600000000000000]}) 07:56:04 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:04 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:04 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:04 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:04 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:04 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:04 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:04 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x700000000000000]}) 07:56:04 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:04 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:04 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:04 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:04 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:04 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:04 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:04 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:04 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:04 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:04 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x3f00000000000000]}) 07:56:04 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:04 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:04 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:05 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:05 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:05 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:05 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:05 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x4000000000000000]}) 07:56:05 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:05 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:05 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:05 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:05 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:05 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:05 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:05 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:05 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0xfeffffff00000000]}) 07:56:05 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:05 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:05 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:05 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:05 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:05 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:05 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:05 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:05 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0xffffff7f00000000]}) 07:56:06 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:06 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:06 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:06 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:06 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:06 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0xffffffff00000000]}) 07:56:06 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:06 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:06 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:06 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:06 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:06 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:06 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:06 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x2]}) 07:56:06 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:06 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:06 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:06 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:06 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:06 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x3]}) 07:56:06 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:06 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:06 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:07 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:07 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:07 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x4]}) 07:56:07 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:07 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:07 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:07 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:07 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:07 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x5]}) 07:56:07 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:07 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:07 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:07 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:07 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:07 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:07 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x6]}) 07:56:07 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:07 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:07 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:07 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x7]}) 07:56:07 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:07 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:08 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:08 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x300]}) 07:56:08 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:08 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x500]}) 07:56:08 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:08 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:08 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:08 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:08 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:08 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:08 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x600]}) 07:56:08 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:08 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:08 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:08 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:08 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x700]}) 07:56:08 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:08 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:08 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:08 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:08 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:08 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x3f00]}) 07:56:08 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:08 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:08 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:09 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:09 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:09 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:09 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x4000]}) 07:56:09 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:09 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:09 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:09 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:09 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x400000]}) 07:56:09 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:09 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:09 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:09 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:09 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:09 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:09 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x80ffff]}) 07:56:09 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:09 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:09 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:09 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:09 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:09 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x1000000]}) 07:56:09 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:09 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:10 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:10 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:10 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x2000000]}) 07:56:10 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:10 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:10 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:10 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:10 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x3000000]}) 07:56:10 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:10 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:10 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:10 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:10 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:10 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x4000000]}) 07:56:10 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:10 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:10 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:10 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:10 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:10 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x5000000]}) 07:56:10 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:10 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:10 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x6000000]}) 07:56:10 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:10 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:11 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:11 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:11 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:11 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x7000000]}) 07:56:11 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:11 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:11 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x3f000000]}) 07:56:11 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:11 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:11 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:11 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:11 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:11 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:11 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:11 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x40000000]}) 07:56:11 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:11 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:11 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:11 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:11 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:11 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:11 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:11 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0xfeffffff]}) 07:56:11 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:12 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:12 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:12 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:12 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:12 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0xffff8000]}) 07:56:12 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:12 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:12 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:12 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0xffffff7f]}) 07:56:12 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:12 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:12 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:12 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:12 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0xfffffffe]}) 07:56:12 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:12 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:12 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:12 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:12 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:12 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x1000000000000]}) 07:56:12 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:12 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:12 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:13 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:13 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:13 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:13 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:13 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:13 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:13 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x40000000000000]}) 07:56:13 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:13 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:13 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:13 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:13 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:13 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x80ffff00000000]}) 07:56:13 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:13 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:13 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:13 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:13 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:13 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:13 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x100000000000000]}) 07:56:13 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:13 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:13 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:13 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:14 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:14 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:14 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:14 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:14 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x200000000000000]}) 07:56:14 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:14 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:14 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:14 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:14 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:14 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x300000000000000]}) 07:56:14 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:14 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:14 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:14 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:14 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:14 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:14 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x400000000000000]}) 07:56:14 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:14 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:14 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:14 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:14 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:14 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:15 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:15 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:15 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:15 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x500000000000000]}) 07:56:15 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:15 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:15 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:15 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:15 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:15 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:15 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:15 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x600000000000000]}) 07:56:15 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:15 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:15 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:15 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:15 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:15 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:15 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x700000000000000]}) 07:56:15 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:15 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:15 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:15 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:15 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:16 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:16 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:16 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:16 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:16 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x3f00000000000000]}) 07:56:16 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:16 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:16 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:16 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:16 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:16 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:16 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:16 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x4000000000000000]}) 07:56:16 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:16 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:16 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:16 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:16 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:16 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:16 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:16 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:16 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0xfeffffff00000000]}) 07:56:16 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:16 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:17 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:17 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:17 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:17 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:17 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:17 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:17 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:17 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:17 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0xffffff7f00000000]}) 07:56:17 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:17 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:17 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:17 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:17 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:17 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:17 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:17 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0xffffffff00000000]}) 07:56:17 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:17 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:17 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:17 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:17 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:17 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:17 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:17 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2]}) 07:56:18 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:18 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:18 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:18 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:18 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:18 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3]}) 07:56:18 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:18 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:18 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:18 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:18 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:18 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:18 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:18 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4]}) 07:56:18 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:18 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:18 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:18 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:18 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:18 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x5]}) 07:56:18 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:18 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:18 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:18 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:19 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:19 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:19 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:19 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:19 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:19 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x6]}) 07:56:19 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:19 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:19 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:19 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:19 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x7]}) 07:56:19 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:19 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:19 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:19 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:19 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:19 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x300]}) 07:56:19 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:19 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:19 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:19 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:19 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:19 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x500]}) 07:56:20 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:20 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:20 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:20 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:20 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x600]}) 07:56:20 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:20 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:20 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:20 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:20 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:20 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x700]}) 07:56:20 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:20 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:20 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:20 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:20 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:20 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:20 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:20 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:20 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3f00]}) 07:56:20 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:20 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:20 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:20 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:21 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:21 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4000]}) 07:56:21 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:21 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:21 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:21 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x400000]}) 07:56:21 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:21 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:21 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:21 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x80ffff]}) 07:56:21 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:21 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:21 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:21 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:21 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:21 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1000000]}) 07:56:21 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:21 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:21 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:21 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:21 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:21 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}) 07:56:21 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:22 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:22 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:22 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:22 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:22 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3000000]}) 07:56:22 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:22 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:22 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:22 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4000000]}) 07:56:22 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:22 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:22 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:22 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:22 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:22 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:22 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:22 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:22 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x5000000]}) 07:56:22 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:22 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:22 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:22 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:22 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:22 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x6000000]}) 07:56:23 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:23 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:23 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:23 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:23 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:23 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x7000000]}) 07:56:23 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:23 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:23 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:23 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:23 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:23 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3f000000]}) 07:56:23 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:23 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:23 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:23 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:23 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x40000000]}) 07:56:23 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:23 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:23 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:23 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:23 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xfeffffff]}) 07:56:23 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:23 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:23 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:24 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:24 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:24 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:24 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xffff8000]}) 07:56:24 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:24 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:24 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:24 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:24 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:24 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:24 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:24 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xffffff7f]}) 07:56:24 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:24 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:24 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:24 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xfffffffe]}) 07:56:24 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:24 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:24 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:24 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:24 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:24 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:24 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:25 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1000000000000]}) 07:56:25 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:25 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:25 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:25 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:25 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:25 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x40000000000000]}) 07:56:25 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:25 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:25 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:25 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:25 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:25 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:25 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:25 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x80ffff00000000]}) 07:56:25 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:25 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:25 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:25 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:25 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:25 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:25 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:26 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 07:56:26 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:26 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:26 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:26 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:26 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:26 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:26 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:26 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:26 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 07:56:26 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:26 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:26 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:26 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:26 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:26 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:26 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:26 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:26 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:26 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x300000000000000]}) 07:56:26 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:26 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:26 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:27 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:27 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:27 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:27 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:27 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x400000000000000]}) 07:56:27 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:27 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:27 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:27 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:27 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:27 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:27 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) 07:56:27 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:27 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:27 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:27 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:27 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:27 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:27 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:27 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:27 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x600000000000000]}) 07:56:27 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:27 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:27 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:28 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:28 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:28 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:28 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:28 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:28 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:28 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x700000000000000]}) 07:56:28 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:28 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:28 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:28 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:28 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:28 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:28 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}) 07:56:28 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:28 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:28 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:28 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:28 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:28 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:28 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:29 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}) 07:56:29 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:29 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:29 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:29 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:29 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:29 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:29 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:29 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:29 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000]}) 07:56:29 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:29 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:29 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:29 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:29 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:29 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:29 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}) 07:56:29 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:29 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:29 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:29 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:29 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:30 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:30 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}) 07:56:30 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:30 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:30 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:30 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:30 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:30 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:30 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:30 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:30 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:30 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x2}}) 07:56:30 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:30 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:30 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:30 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:30 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:30 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:30 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x3}}) 07:56:30 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:30 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:30 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:30 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:31 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:31 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:31 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:31 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:31 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x4}}) 07:56:31 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:31 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:31 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:31 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:31 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:31 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x5}}) 07:56:31 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:31 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:31 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:31 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:31 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:31 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:31 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x6}}) 07:56:31 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:31 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:31 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:32 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:32 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:32 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:32 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:32 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:32 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x7}}) 07:56:32 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:32 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:32 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:32 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:32 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:32 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:32 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x300}}) 07:56:32 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:32 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:32 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:32 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:32 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:32 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:32 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:32 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:32 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x500}}) 07:56:32 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:32 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:33 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:33 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:33 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:33 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:33 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:33 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x600}}) 07:56:33 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:33 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:33 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:33 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:33 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:33 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x700}}) 07:56:33 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:33 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:33 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:33 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:33 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:33 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:33 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x3f00}}) 07:56:33 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:33 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:34 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:34 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:34 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:34 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:34 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:34 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x4000}}) 07:56:34 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:34 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:34 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:34 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:34 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:34 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x400000}}) 07:56:34 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:34 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:34 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:34 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:34 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:34 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:34 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:34 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x80ffff}}) 07:56:34 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:34 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:35 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:35 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:35 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:35 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:35 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:35 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:35 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x1000000}}) 07:56:35 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:35 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:35 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:35 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:35 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:35 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:35 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x2000000}}) 07:56:35 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:35 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:35 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:35 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:35 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:35 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:35 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:35 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:35 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:36 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:36 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x3000000}}) 07:56:36 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:36 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:36 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:36 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:36 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:36 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:36 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x4000000}}) 07:56:36 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:36 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:36 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:36 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:36 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:36 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:36 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:36 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x5000000}}) 07:56:36 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:36 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:36 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:36 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:36 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:36 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:37 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x6000000}}) 07:56:37 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:37 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:37 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:37 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:37 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:37 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:37 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:37 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x7000000}}) 07:56:37 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:37 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:37 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:37 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:37 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:37 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:37 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:37 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:37 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x3f000000}}) 07:56:37 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:37 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:37 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:37 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:38 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:38 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:38 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:38 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:38 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x40000000}}) 07:56:38 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:38 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:38 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:38 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:38 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:38 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:38 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0xfeffffff}}) 07:56:38 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:38 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:38 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:38 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:38 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:38 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:38 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0xffff8000}}) 07:56:38 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:38 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:38 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:39 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:39 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:39 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:39 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:39 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:39 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0xffffff7f}}) 07:56:39 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:39 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:39 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:39 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:39 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:39 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:39 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:39 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:39 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:39 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0xfffffffe}}) 07:56:39 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:39 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:39 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:39 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:39 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:39 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:39 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x1000000000000}}) 07:56:39 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:39 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:39 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:40 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:40 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:40 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:40 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x40000000000000}}) 07:56:40 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:40 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:40 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:40 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:40 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:40 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:40 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:40 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:40 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x80ffff00000000}}) 07:56:40 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:40 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:40 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:40 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:40 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:40 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x100000000000000}}) 07:56:40 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:40 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:40 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:40 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:40 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:41 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:41 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:41 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:41 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x200000000000000}}) 07:56:41 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:41 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:41 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:41 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:41 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:41 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x300000000000000}}) 07:56:41 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:41 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:41 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:41 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:41 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:41 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:41 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:41 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:41 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:41 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x400000000000000}}) 07:56:41 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:41 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:41 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:41 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:41 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:42 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:42 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:42 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x500000000000000}}) 07:56:42 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:42 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:42 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:42 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:42 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:42 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:42 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:42 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:42 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x600000000000000}}) 07:56:42 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:42 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:42 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:42 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:42 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:42 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x700000000000000}}) 07:56:42 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:42 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:42 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:42 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:42 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:43 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:43 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:43 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x3f00000000000000}}) 07:56:43 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:43 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:43 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:43 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:43 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:43 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:43 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x4000000000000000}}) 07:56:43 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:43 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:43 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:43 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:43 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0xfeffffff00000000}}) 07:56:43 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:43 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:43 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:43 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:43 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:43 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:43 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:43 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:43 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0xffffff7f00000000}}) 07:56:43 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:43 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:44 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:44 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:44 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:44 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:44 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0xffffffff00000000}}) 07:56:44 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:44 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:44 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:44 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:44 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:44 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:44 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x2}}) 07:56:44 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:44 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:44 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:44 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:44 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:44 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:44 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:44 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:44 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x3}}) 07:56:44 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:44 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:44 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:45 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:45 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:45 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:45 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x4}}) 07:56:45 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:45 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:45 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:45 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:45 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:45 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:45 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:45 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x5}}) 07:56:45 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:45 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:45 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:45 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:45 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:45 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x6}}) 07:56:45 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:45 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:45 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:45 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:45 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:46 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:46 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:46 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:46 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x7}}) 07:56:46 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:46 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:46 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:46 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:46 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:46 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:46 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x300}}) 07:56:46 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:46 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:46 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:46 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:46 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:46 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:46 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:46 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:46 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:46 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x500}}) 07:56:46 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:46 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:46 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:47 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:47 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:47 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:47 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:47 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x600}}) 07:56:47 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:47 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:47 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:47 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:47 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:47 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:47 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:47 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x700}}) 07:56:47 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:47 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:47 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:47 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:47 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:47 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:47 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:47 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:47 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x3f00}}) 07:56:47 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:47 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:48 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:48 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:48 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:48 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:48 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:48 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:48 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x4000}}) 07:56:48 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:48 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:48 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:48 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:48 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x400000}}) 07:56:48 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:48 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:48 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:48 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:48 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:48 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:48 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x80ffff}}) 07:56:48 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:48 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:48 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:49 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:49 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:49 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:49 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:49 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:49 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:49 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x1000000}}) 07:56:49 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:49 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:49 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:49 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:49 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:49 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:49 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:49 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x2000000}}) 07:56:49 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:49 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:49 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:49 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:49 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:49 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:49 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:49 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x3000000}}) 07:56:50 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:50 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:50 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:50 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:50 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x4000000}}) 07:56:50 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:50 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:50 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:50 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:50 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:50 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:50 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:50 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:50 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x5000000}}) 07:56:50 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:50 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:50 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:50 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:50 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:50 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:50 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x6000000}}) 07:56:50 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:50 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:50 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:51 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:51 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:51 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:51 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:51 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:51 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x7000000}}) 07:56:51 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:51 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:51 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:51 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:51 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:51 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:51 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x3f000000}}) 07:56:51 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:51 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:51 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:51 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:51 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:51 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:51 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x40000000}}) 07:56:51 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:51 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:51 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:51 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:52 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:52 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:52 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0xfeffffff}}) 07:56:52 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:52 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:52 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:52 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:52 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:52 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:52 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0xffff8000}}) 07:56:52 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:52 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:52 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:52 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:52 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:52 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:52 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:52 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:52 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0xffffff7f}}) 07:56:52 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:52 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:52 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:53 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:53 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:53 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:53 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0xfffffffe}}) 07:56:53 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:53 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:53 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:53 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:53 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:53 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:53 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:53 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:53 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x1000000000000}}) 07:56:53 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:53 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:53 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:53 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:53 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:53 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x40000000000000}}) 07:56:53 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:53 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:53 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:54 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:54 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:54 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:54 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:54 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:54 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:54 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:54 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x80ffff00000000}}) 07:56:54 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:54 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:54 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:54 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:54 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:54 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:54 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x100000000000000}}) 07:56:54 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:54 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:54 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:54 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:54 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:54 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:54 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x200000000000000}}) 07:56:54 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:54 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:55 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:55 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:55 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:55 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:55 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:55 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:55 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:55 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x300000000000000}}) 07:56:55 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:55 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:55 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:55 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:55 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:55 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:55 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:55 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x400000000000000}}) 07:56:55 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:55 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:55 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:55 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:56 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:56 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:56 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:56 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:56 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:56 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x500000000000000}}) 07:56:56 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:56 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:56 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:56 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:56 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:56 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:56 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:56 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:56 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:56 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x600000000000000}}) 07:56:56 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:56 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:56 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:56 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:56 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:56 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x700000000000000}}) 07:56:56 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:56 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:56 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:57 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:57 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:57 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:57 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:57 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:57 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:57 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x3f00000000000000}}) 07:56:57 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:57 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:57 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:57 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:57 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:57 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x4000000000000000}}) 07:56:57 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:57 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:57 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:57 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:57 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:57 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:57 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:58 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:58 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:58 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:58 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0xfeffffff00000000}}) 07:56:58 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:58 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:58 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:58 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:58 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:58 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:58 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0xffffff7f00000000}}) 07:56:58 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:58 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:58 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:58 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:58 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:58 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:58 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0xffffffff00000000}}) 07:56:58 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:58 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:58 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:58 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:58 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:58 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:59 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:59 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x0, 0x2}}) 07:56:59 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:59 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:59 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:59 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:59 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:59 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:59 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:59 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x0, 0x3}}) 07:56:59 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:59 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:59 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:59 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:59 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:59 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:56:59 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x0, 0x4}}) 07:56:59 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:56:59 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:59 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:59 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:56:59 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:56:59 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:57:00 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:57:00 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:57:00 executing program 0: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7, 0x0, 0x0, [], {0x0, 0x0, 0x5}}) 07:57:00 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:57:00 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:57:00 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:57:00 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:57:00 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:57:00 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x3}) 07:57:00 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:57:00 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x113, 0x5}}, 0x20) write$P9_RGETLOCK(r0, &(0x7f0000000e80)={0x22, 0x37, 0x1, {0x2, 0x7fffffff, 0xc7, 0x0, 0x4, 'port'}}, 0x22) 07:57:00 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) 07:57:00 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) 07:57:00 executing program 3: r0 = getpgid(0x0) kcmp(0x0, r0, 0x7, 0xffffffffffffffff, 0xffffffffffffff9c) [ 419.082254][ T1046] INFO: task syz-executor.0:21293 blocked for more than 143 seconds. [ 419.090509][ T1046] Not tainted 5.2.0+ #55 [ 419.095457][ T1046] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 419.104198][ T1046] syz-executor.0 D28208 21293 8674 0x00004004 [ 419.110536][ T1046] Call Trace: [ 419.113879][ T1046] __schedule+0x7c5/0x1560 [ 419.118322][ T1046] ? __sched_text_start+0x8/0x8 [ 419.123258][ T1046] ? __lock_acquire+0x537/0x4af0 [ 419.128199][ T1046] schedule+0xa8/0x260 [ 419.132308][ T1046] schedule_timeout+0x717/0xc50 [ 419.137165][ T1046] ? find_held_lock+0x35/0x130 [ 419.141915][ T1046] ? usleep_range+0x170/0x170 [ 419.146653][ T1046] ? lock_downgrade+0x920/0x920 [ 419.151588][ T1046] ? _raw_spin_unlock_irq+0x28/0x90 [ 419.157407][ T1046] ? wait_for_completion+0x294/0x440 [ 419.162756][ T1046] ? _raw_spin_unlock_irq+0x28/0x90 [ 419.167968][ T1046] ? lockdep_hardirqs_on+0x418/0x5d0 [ 419.173319][ T1046] ? trace_hardirqs_on+0x67/0x220 [ 419.178355][ T1046] ? kasan_check_read+0x11/0x20 [ 419.183409][ T1046] wait_for_completion+0x29c/0x440 [ 419.188505][ T1046] ? try_to_wake_up+0xde/0x1a10 [ 419.193423][ T1046] ? wait_for_completion_interruptible+0x4b0/0x4b0 [ 419.199931][ T1046] ? wake_up_q+0xf0/0xf0 [ 419.204231][ T1046] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 419.210057][ T1046] kthread_stop+0x10b/0x6c0 [ 419.214639][ T1046] io_finish_async+0x73/0x140 [ 419.219358][ T1046] io_ring_ctx_wait_and_kill+0x133/0x600 [ 419.225063][ T1046] io_uring_release+0x42/0x50 [ 419.229743][ T1046] __fput+0x2ff/0x890 [ 419.233776][ T1046] ? io_ring_ctx_wait_and_kill+0x600/0x600 [ 419.239579][ T1046] ____fput+0x16/0x20 [ 419.243617][ T1046] task_work_run+0x145/0x1c0 [ 419.248225][ T1046] exit_to_usermode_loop+0x309/0x370 [ 419.253566][ T1046] do_syscall_64+0x58e/0x680 [ 419.258173][ T1046] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 419.264125][ T1046] RIP: 0033:0x4134b1 [ 419.268026][ T1046] Code: cf 48 c1 e9 03 4c 8b 05 a5 1c 3b 01 48 c1 ef 05 49 29 f8 49 8d 78 ff 48 83 e1 03 48 83 fa 10 0f 84 a7 04 00 00 44 0f b6 43 17 <41> f6 c0 40 0f 85 58 04 00 00 4c 8b 03 48 8b 44 24 68 49 39 c0 0f [ 419.288264][ T1046] RSP: 002b:00007fffb7ff99f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 419.296712][ T1046] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00000000004134b1 [ 419.304756][ T1046] RDX: 0000001b31d20000 RSI: 0000000000000000 RDI: 0000000000000003 [ 419.312766][ T1046] RBP: 0000000000000001 R08: 0000000069720dfa R09: 0000000069720dfe [ 419.320731][ T1046] R10: 00007fffb7ff9ad0 R11: 0000000000000293 R12: 000000000075bf20 [ 419.328854][ T1046] R13: 000000000003e88e R14: 00000000007604b0 R15: ffffffffffffffff [ 419.336892][ T1046] [ 419.336892][ T1046] Showing all locks held in the system: [ 419.344689][ T1046] 1 lock held by khungtaskd/1046: [ 419.349725][ T1046] #0: 00000000cab6b8df (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 419.359099][ T1046] 1 lock held by rsyslogd/8545: [ 419.363999][ T1046] #0: 0000000097d86d24 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 419.372753][ T1046] 2 locks held by getty/8634: [ 419.377425][ T1046] #0: 00000000a5639516 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 419.386459][ T1046] #1: 000000007cf1a0ba (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 419.396106][ T1046] 2 locks held by getty/8635: [ 419.400769][ T1046] #0: 000000003d053628 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 419.410305][ T1046] #1: 000000008c506abf (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 419.420447][ T1046] 2 locks held by getty/8636: [ 419.425180][ T1046] #0: 00000000840d7eba (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 419.434255][ T1046] #1: 0000000053a87520 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 419.443892][ T1046] 2 locks held by getty/8637: [ 419.448575][ T1046] #0: 00000000ce56da64 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 419.457880][ T1046] #1: 0000000076922c5e (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 419.467566][ T1046] 2 locks held by getty/8638: [ 419.472371][ T1046] #0: 000000005baf94b7 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 419.481347][ T1046] #1: 0000000031b26ff1 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 419.491036][ T1046] 2 locks held by getty/8639: [ 419.495753][ T1046] #0: 00000000d215f7b7 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 419.504807][ T1046] #1: 000000005f9e7946 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 419.514506][ T1046] 2 locks held by getty/8640: [ 419.519173][ T1046] #0: 00000000537a4e58 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 419.528195][ T1046] #1: 000000003c22b9d0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 419.538264][ T1046] [ 419.540594][ T1046] ============================================= [ 419.540594][ T1046] [ 419.549655][ T1046] NMI backtrace for cpu 1 [ 419.554035][ T1046] CPU: 1 PID: 1046 Comm: khungtaskd Not tainted 5.2.0+ #55 [ 419.561229][ T1046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 419.571265][ T1046] Call Trace: [ 419.574692][ T1046] dump_stack+0x172/0x1f0 [ 419.580756][ T1046] nmi_cpu_backtrace.cold+0x63/0xa4 [ 419.585935][ T1046] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 419.591762][ T1046] nmi_trigger_cpumask_backtrace+0x1ca/0x242 [ 419.597723][ T1046] arch_trigger_cpumask_backtrace+0x14/0x20 [ 419.603596][ T1046] watchdog+0x9b7/0xec0 [ 419.607753][ T1046] kthread+0x354/0x420 [ 419.611805][ T1046] ? reset_hung_task_detector+0x30/0x30 [ 419.617521][ T1046] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 419.623762][ T1046] ret_from_fork+0x24/0x30 [ 419.628335][ T1046] Sending NMI from CPU 1 to CPUs 0: [ 419.633930][ C0] NMI backtrace for cpu 0 [ 419.633936][ C0] CPU: 0 PID: 8773 Comm: kworker/u4:6 Not tainted 5.2.0+ #55 [ 419.633943][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 419.633947][ C0] Workqueue: bat_events batadv_nc_worker [ 419.633954][ C0] RIP: 0010:lock_release+0x2fc/0x930 [ 419.633966][ C0] Code: 03 0f b6 14 11 84 d2 74 09 80 fa 03 0f 8e bf 05 00 00 66 83 68 22 10 66 f7 40 22 f0 ff 0f 85 32 01 00 00 4c 89 ce 41 8b 56 c0 <48> b9 00 00 00 00 00 fc ff df 48 c1 ee 03 0f b6 0c 0e 84 c9 74 09 [ 419.633970][ C0] RSP: 0018:ffff888087f6fc00 EFLAGS: 00000046 [ 419.633978][ C0] RAX: ffff888096610d20 RBX: 1ffff11010fedf85 RCX: 0000000000000000 [ 419.633983][ C0] RDX: 0000000000000002 RSI: ffff888096610cc8 RDI: ffff888096610d42 [ 419.633988][ C0] RBP: ffff888087f6fcd0 R08: 0000000000000003 R09: ffff888096610cc8 [ 419.633993][ C0] R10: ffffed1015d06c73 R11: ffff8880ae83639b R12: ffffffff88da9980 [ 419.633999][ C0] R13: ffffffff8703f9ea R14: ffff888087f6fca8 R15: ffff888096610440 [ 419.634004][ C0] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 419.634009][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 419.634014][ C0] CR2: 0000000000efb4c0 CR3: 000000009aea9000 CR4: 00000000001406f0 [ 419.634019][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 419.634024][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 419.634027][ C0] Call Trace: [ 419.634031][ C0] ? lock_downgrade+0x920/0x920 [ 419.634035][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 419.634039][ C0] ? kasan_check_read+0x11/0x20 [ 419.634043][ C0] batadv_nc_worker+0x225/0x760 [ 419.634046][ C0] process_one_work+0x989/0x16d0 [ 419.634050][ C0] ? pwq_dec_nr_in_flight+0x320/0x320 [ 419.634054][ C0] ? lock_acquire+0x16f/0x3f0 [ 419.634057][ C0] worker_thread+0x98/0xe40 [ 419.634061][ C0] ? trace_hardirqs_on+0x67/0x220 [ 419.634065][ C0] kthread+0x354/0x420 [ 419.634068][ C0] ? process_one_work+0x16d0/0x16d0 [ 419.634073][ C0] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 419.634076][ C0] ret_from_fork+0x24/0x30 [ 419.634596][ T1046] Kernel panic - not syncing: hung_task: blocked tasks [ 419.847479][ T1046] CPU: 1 PID: 1046 Comm: khungtaskd Not tainted 5.2.0+ #55 [ 419.854651][ T1046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 419.864775][ T1046] Call Trace: [ 419.868061][ T1046] dump_stack+0x172/0x1f0 [ 419.872374][ T1046] panic+0x2cb/0x744 [ 419.876290][ T1046] ? __warn_printk+0xf3/0xf3 [ 419.880868][ T1046] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 419.886571][ T1046] ? printk_safe_flush+0xf2/0x140 [ 419.891579][ T1046] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 419.897822][ T1046] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 419.903444][ T1046] ? nmi_trigger_cpumask_backtrace+0x1b3/0x242 [ 419.909579][ T1046] ? nmi_trigger_cpumask_backtrace+0x1aa/0x242 [ 419.915717][ T1046] watchdog+0x9c8/0xec0 [ 419.919866][ T1046] kthread+0x354/0x420 [ 419.923916][ T1046] ? reset_hung_task_detector+0x30/0x30 [ 419.929439][ T1046] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 419.935666][ T1046] ret_from_fork+0x24/0x30 [ 419.941352][ T1046] Kernel Offset: disabled [ 419.945678][ T1046] Rebooting in 86400 seconds..