Debian GNU/Linux 11 syzkaller ttyS0 Warning: Permanently added '[localhost]:42237' (ECDSA) to the list of known hosts. 2022/10/01 01:58:07 fuzzer started 2022/10/01 01:58:08 dialing manager at localhost:35095 syzkaller login: [ 37.362735] cgroup: Unknown subsys name 'net' [ 37.474408] cgroup: Unknown subsys name 'rlimit' 2022/10/01 01:58:23 syscalls: 2215 2022/10/01 01:58:23 code coverage: enabled 2022/10/01 01:58:23 comparison tracing: enabled 2022/10/01 01:58:23 extra coverage: enabled 2022/10/01 01:58:23 setuid sandbox: enabled 2022/10/01 01:58:23 namespace sandbox: enabled 2022/10/01 01:58:23 Android sandbox: enabled 2022/10/01 01:58:23 fault injection: enabled 2022/10/01 01:58:23 leak checking: enabled 2022/10/01 01:58:23 net packet injection: enabled 2022/10/01 01:58:23 net device setup: enabled 2022/10/01 01:58:23 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/10/01 01:58:23 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/10/01 01:58:23 USB emulation: enabled 2022/10/01 01:58:23 hci packet injection: enabled 2022/10/01 01:58:23 wifi device emulation: failed to parse kernel version (6.0.0-rc7-next-20220930) 2022/10/01 01:58:23 802.15.4 emulation: enabled 2022/10/01 01:58:23 fetching corpus: 0, signal 0/2000 (executing program) 2022/10/01 01:58:23 fetching corpus: 31, signal 22362/25252 (executing program) 2022/10/01 01:58:23 fetching corpus: 81, signal 39368/42265 (executing program) 2022/10/01 01:58:23 fetching corpus: 130, signal 47569/50580 (executing program) 2022/10/01 01:58:23 fetching corpus: 180, signal 53085/56166 (executing program) 2022/10/01 01:58:24 fetching corpus: 229, signal 56479/59680 (executing program) 2022/10/01 01:58:24 fetching corpus: 278, signal 60441/63442 (executing program) 2022/10/01 01:58:24 fetching corpus: 327, signal 63848/66578 (executing program) 2022/10/01 01:58:24 fetching corpus: 375, signal 66348/68764 (executing program) 2022/10/01 01:58:24 fetching corpus: 425, signal 71359/72709 (executing program) 2022/10/01 01:58:24 fetching corpus: 470, signal 73373/74296 (executing program) 2022/10/01 01:58:24 fetching corpus: 473, signal 73551/74569 (executing program) 2022/10/01 01:58:24 fetching corpus: 473, signal 73551/74674 (executing program) 2022/10/01 01:58:24 fetching corpus: 473, signal 73551/74772 (executing program) 2022/10/01 01:58:24 fetching corpus: 473, signal 73551/74861 (executing program) 2022/10/01 01:58:24 fetching corpus: 473, signal 73551/74957 (executing program) 2022/10/01 01:58:24 fetching corpus: 473, signal 73551/75057 (executing program) 2022/10/01 01:58:24 fetching corpus: 473, signal 73551/75140 (executing program) 2022/10/01 01:58:24 fetching corpus: 473, signal 73551/75231 (executing program) 2022/10/01 01:58:25 fetching corpus: 473, signal 73551/75329 (executing program) 2022/10/01 01:58:25 fetching corpus: 473, signal 73551/75393 (executing program) 2022/10/01 01:58:25 fetching corpus: 473, signal 73551/75482 (executing program) 2022/10/01 01:58:25 fetching corpus: 473, signal 73551/75569 (executing program) 2022/10/01 01:58:25 fetching corpus: 473, signal 73573/75676 (executing program) 2022/10/01 01:58:25 fetching corpus: 473, signal 73573/75756 (executing program) 2022/10/01 01:58:25 fetching corpus: 473, signal 73573/75855 (executing program) 2022/10/01 01:58:25 fetching corpus: 473, signal 73573/75940 (executing program) 2022/10/01 01:58:25 fetching corpus: 473, signal 73573/76051 (executing program) 2022/10/01 01:58:25 fetching corpus: 473, signal 73585/76128 (executing program) 2022/10/01 01:58:25 fetching corpus: 473, signal 73585/76205 (executing program) 2022/10/01 01:58:25 fetching corpus: 473, signal 73585/76287 (executing program) 2022/10/01 01:58:25 fetching corpus: 473, signal 73585/76377 (executing program) 2022/10/01 01:58:25 fetching corpus: 473, signal 73585/76472 (executing program) 2022/10/01 01:58:25 fetching corpus: 473, signal 73585/76573 (executing program) 2022/10/01 01:58:25 fetching corpus: 473, signal 73585/76671 (executing program) 2022/10/01 01:58:25 fetching corpus: 473, signal 73585/76749 (executing program) 2022/10/01 01:58:25 fetching corpus: 473, signal 73585/76825 (executing program) 2022/10/01 01:58:25 fetching corpus: 474, signal 73600/76862 (executing program) 2022/10/01 01:58:25 fetching corpus: 474, signal 73600/76862 (executing program) 2022/10/01 01:58:27 starting 8 fuzzer processes 01:58:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f00000000c0)=0x300) 01:58:27 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000ac0), 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000000)=""/240) 01:58:27 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x12040) 01:58:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001600)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000007b40), 0x4) 01:58:27 executing program 4: prctl$PR_SET_MM(0x2f, 0x0, &(0x7f0000ff6000/0x1000)=nil) [ 56.537026] audit: type=1400 audit(1664589507.735:6): avc: denied { execmem } for pid=282 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 01:58:27 executing program 5: move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x6) 01:58:27 executing program 6: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000003580)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[{0x10, 0x1, 0x2}], 0x10}}], 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = dup(r1) sendmsg$nl_xfrm(r2, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000000)=ANY=[@ANYBLOB="681100001c00018201b87f5001533eff132c0029bd7000fcdbdf2533"], 0x1168}}, 0x0) 01:58:27 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) r3 = accept4$inet6(r1, 0x0, &(0x7f0000000380), 0x80400) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x3, @remote, 0x81}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r4, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x165c02, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}], 0x4, 0x0, 0x4) [ 57.790280] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 57.791896] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 57.793366] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 57.797637] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 57.800813] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 57.803429] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 57.808190] Bluetooth: hci0: HCI_REQ-0x0c1a [ 57.840374] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 57.842411] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 57.843851] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 57.846661] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 57.848511] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 57.849924] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 57.861664] Bluetooth: hci2: HCI_REQ-0x0c1a [ 57.902706] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 57.909834] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 57.911021] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 57.912513] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 57.913983] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 57.914991] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 57.916456] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 57.917699] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 57.919480] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 57.922581] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 57.924827] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 57.926011] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 57.927721] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 57.928921] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 57.929914] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 57.931240] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 57.932360] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 57.933550] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 57.938458] Bluetooth: hci5: HCI_REQ-0x0c1a [ 57.941606] Bluetooth: hci4: HCI_REQ-0x0c1a [ 57.945249] Bluetooth: hci6: HCI_REQ-0x0c1a [ 57.967663] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 57.969500] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 57.970822] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 57.973201] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 57.974776] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 57.976206] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 57.980451] Bluetooth: hci1: HCI_REQ-0x0c1a [ 59.872696] Bluetooth: hci0: command 0x0409 tx timeout [ 59.936101] Bluetooth: hci3: Opcode 0x c03 failed: -110 [ 59.936112] Bluetooth: hci2: command 0x0409 tx timeout [ 60.000219] Bluetooth: hci1: command 0x0409 tx timeout [ 60.000222] Bluetooth: hci6: command 0x0409 tx timeout [ 60.000826] Bluetooth: hci5: command 0x0409 tx timeout [ 60.001422] Bluetooth: hci4: command 0x0409 tx timeout [ 60.002484] Bluetooth: hci7: Opcode 0x c03 failed: -110 [ 61.921093] Bluetooth: hci0: command 0x041b tx timeout [ 61.985100] Bluetooth: hci2: command 0x041b tx timeout [ 62.048140] Bluetooth: hci5: command 0x041b tx timeout [ 62.048557] Bluetooth: hci1: command 0x041b tx timeout [ 62.048961] Bluetooth: hci6: command 0x041b tx timeout [ 62.049818] Bluetooth: hci4: command 0x041b tx timeout [ 62.987881] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 62.989800] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 63.016642] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 63.038569] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 63.039581] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 63.053015] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 63.066786] Bluetooth: hci3: HCI_REQ-0x0c1a [ 63.969280] Bluetooth: hci0: command 0x040f tx timeout [ 64.032174] Bluetooth: hci2: command 0x040f tx timeout [ 64.096107] Bluetooth: hci4: command 0x040f tx timeout [ 64.096526] Bluetooth: hci6: command 0x040f tx timeout [ 64.096920] Bluetooth: hci1: command 0x040f tx timeout [ 64.097378] Bluetooth: hci5: command 0x040f tx timeout [ 64.993173] Bluetooth: hci7: Opcode 0x c03 failed: -110 [ 65.120125] Bluetooth: hci3: command 0x0409 tx timeout [ 66.016140] Bluetooth: hci0: command 0x0419 tx timeout [ 66.081130] Bluetooth: hci2: command 0x0419 tx timeout [ 66.145112] Bluetooth: hci5: command 0x0419 tx timeout [ 66.145519] Bluetooth: hci1: command 0x0419 tx timeout [ 66.145938] Bluetooth: hci6: command 0x0419 tx timeout [ 66.146367] Bluetooth: hci4: command 0x0419 tx timeout [ 67.168150] Bluetooth: hci3: command 0x041b tx timeout [ 69.216099] Bluetooth: hci3: command 0x040f tx timeout [ 69.408129] Bluetooth: hci7: Opcode 0x c03 failed: -110 [ 71.264132] Bluetooth: hci3: command 0x0419 tx timeout [ 71.832330] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 71.834323] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 71.834989] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 71.838327] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 71.856774] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 71.857694] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 71.868618] Bluetooth: hci7: HCI_REQ-0x0c1a [ 73.889131] Bluetooth: hci7: command 0x0409 tx timeout [ 75.936091] Bluetooth: hci7: command 0x041b tx timeout [ 77.984239] Bluetooth: hci7: command 0x040f tx timeout [ 80.033093] Bluetooth: hci7: command 0x0419 tx timeout 01:59:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001600)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000007b40), 0x4) 01:59:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001600)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000007b40), 0x4) 01:59:17 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x12040) 01:59:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001600)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000007b40), 0x4) 01:59:17 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x12040) 01:59:18 executing program 2: syz_emit_ethernet(0x46, &(0x7f0000001400)={@multicast, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '#\x00\b', 0x10, 0x2c, 0x0, @empty, @local, {[], {0x0, 0xfffc, 0x10, 0x0, @opaque="44e67c344da1a96c"}}}}}}, 0x0) 01:59:18 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x12040) 01:59:18 executing program 2: syz_emit_ethernet(0x46, &(0x7f0000001400)={@multicast, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '#\x00\b', 0x10, 0x2c, 0x0, @empty, @local, {[], {0x0, 0xfffc, 0x10, 0x0, @opaque="44e67c344da1a96c"}}}}}}, 0x0) [ 109.005737] netlink: 4436 bytes leftover after parsing attributes in process `syz-executor.6'. [ 109.014667] netlink: 4436 bytes leftover after parsing attributes in process `syz-executor.6'. [ 116.223562] audit: type=1400 audit(1664589567.422:7): avc: denied { open } for pid=3972 comm="syz-executor.7" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 116.225322] audit: type=1400 audit(1664589567.422:8): avc: denied { kernel } for pid=3972 comm="syz-executor.7" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 116.233905] ------------[ cut here ]------------ [ 116.233932] [ 116.233936] ====================================================== [ 116.233941] WARNING: possible circular locking dependency detected [ 116.233947] 6.0.0-rc7-next-20220930 #1 Not tainted [ 116.233955] ------------------------------------------------------ [ 116.233960] syz-executor.7/3973 is trying to acquire lock: [ 116.233968] ffffffff853faab8 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 116.234022] [ 116.234022] but task is already holding lock: [ 116.234025] ffff88800ee21420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 116.234066] [ 116.234066] which lock already depends on the new lock. [ 116.234066] [ 116.234070] [ 116.234070] the existing dependency chain (in reverse order) is: [ 116.234075] [ 116.234075] -> #3 (&ctx->lock){....}-{2:2}: [ 116.234093] _raw_spin_lock+0x2a/0x40 [ 116.234109] __perf_event_task_sched_out+0x53b/0x18d0 [ 116.234124] __schedule+0xedd/0x2470 [ 116.234144] schedule+0xda/0x1b0 [ 116.234162] exit_to_user_mode_prepare+0x114/0x1a0 [ 116.234179] syscall_exit_to_user_mode+0x19/0x40 [ 116.234197] do_syscall_64+0x48/0x90 [ 116.234220] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 116.234238] [ 116.234238] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 116.234257] _raw_spin_lock_nested+0x30/0x40 [ 116.234271] raw_spin_rq_lock_nested+0x1e/0x30 [ 116.234289] task_fork_fair+0x63/0x4d0 [ 116.234312] sched_cgroup_fork+0x3d0/0x540 [ 116.234332] copy_process+0x4183/0x6e20 [ 116.234347] kernel_clone+0xe7/0x890 [ 116.234360] user_mode_thread+0xad/0xf0 [ 116.234374] rest_init+0x24/0x250 [ 116.234390] arch_call_rest_init+0xf/0x14 [ 116.234414] start_kernel+0x4c6/0x4eb [ 116.234435] secondary_startup_64_no_verify+0xe0/0xeb [ 116.234455] [ 116.234455] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 116.234473] _raw_spin_lock_irqsave+0x39/0x60 [ 116.234488] try_to_wake_up+0xab/0x1930 [ 116.234506] up+0x75/0xb0 [ 116.234525] __up_console_sem+0x6e/0x80 [ 116.234547] console_unlock+0x46a/0x590 [ 116.234569] vprintk_emit+0x1bd/0x560 [ 116.234591] vprintk+0x84/0xa0 [ 116.234612] _printk+0xba/0xf1 [ 116.234628] regdb_fw_cb.cold+0x6c/0xa7 [ 116.234651] request_firmware_work_func+0x12e/0x240 [ 116.234678] process_one_work+0xa17/0x16a0 [ 116.234702] worker_thread+0x637/0x1260 [ 116.234725] kthread+0x2ed/0x3a0 [ 116.234744] ret_from_fork+0x22/0x30 [ 116.234761] [ 116.234761] -> #0 ((console_sem).lock){....}-{2:2}: [ 116.234779] __lock_acquire+0x2a02/0x5e70 [ 116.234803] lock_acquire+0x1a2/0x530 [ 116.234825] _raw_spin_lock_irqsave+0x39/0x60 [ 116.234839] down_trylock+0xe/0x70 [ 116.234860] __down_trylock_console_sem+0x3b/0xd0 [ 116.234882] vprintk_emit+0x16b/0x560 [ 116.234904] vprintk+0x84/0xa0 [ 116.234926] _printk+0xba/0xf1 [ 116.234940] report_bug.cold+0x72/0xab [ 116.234962] handle_bug+0x3c/0x70 [ 116.234984] exc_invalid_op+0x14/0x50 [ 116.235012] asm_exc_invalid_op+0x16/0x20 [ 116.235029] group_sched_out.part.0+0x2c7/0x460 [ 116.235054] ctx_sched_out+0x8f1/0xc10 [ 116.235077] __perf_event_task_sched_out+0x6d0/0x18d0 [ 116.235092] __schedule+0xedd/0x2470 [ 116.235110] schedule+0xda/0x1b0 [ 116.235128] exit_to_user_mode_prepare+0x114/0x1a0 [ 116.235143] syscall_exit_to_user_mode+0x19/0x40 [ 116.235160] do_syscall_64+0x48/0x90 [ 116.235183] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 116.235200] [ 116.235200] other info that might help us debug this: [ 116.235200] [ 116.235204] Chain exists of: [ 116.235204] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 116.235204] [ 116.235224] Possible unsafe locking scenario: [ 116.235224] [ 116.235228] CPU0 CPU1 [ 116.235231] ---- ---- [ 116.235234] lock(&ctx->lock); [ 116.235242] lock(&rq->__lock); [ 116.235250] lock(&ctx->lock); [ 116.235259] lock((console_sem).lock); [ 116.235267] [ 116.235267] *** DEADLOCK *** [ 116.235267] [ 116.235269] 2 locks held by syz-executor.7/3973: [ 116.235279] #0: ffff88806ce37e98 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 116.235319] #1: ffff88800ee21420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 116.235355] [ 116.235355] stack backtrace: [ 116.235359] CPU: 0 PID: 3973 Comm: syz-executor.7 Not tainted 6.0.0-rc7-next-20220930 #1 [ 116.235377] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 116.235387] Call Trace: [ 116.235392] [ 116.235398] dump_stack_lvl+0x8b/0xb3 [ 116.235423] check_noncircular+0x263/0x2e0 [ 116.235445] ? format_decode+0x26c/0xb50 [ 116.235468] ? print_circular_bug+0x450/0x450 [ 116.235491] ? simple_strtoul+0x30/0x30 [ 116.235513] ? format_decode+0x26c/0xb50 [ 116.235537] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 116.235561] __lock_acquire+0x2a02/0x5e70 [ 116.235591] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 116.235622] lock_acquire+0x1a2/0x530 [ 116.235645] ? down_trylock+0xe/0x70 [ 116.235668] ? lock_release+0x750/0x750 [ 116.235697] ? vprintk+0x84/0xa0 [ 116.235721] _raw_spin_lock_irqsave+0x39/0x60 [ 116.235737] ? down_trylock+0xe/0x70 [ 116.235759] down_trylock+0xe/0x70 [ 116.235781] ? vprintk+0x84/0xa0 [ 116.235804] __down_trylock_console_sem+0x3b/0xd0 [ 116.235828] vprintk_emit+0x16b/0x560 [ 116.235854] vprintk+0x84/0xa0 [ 116.235877] _printk+0xba/0xf1 [ 116.235893] ? record_print_text.cold+0x16/0x16 [ 116.235915] ? report_bug.cold+0x66/0xab [ 116.235940] ? group_sched_out.part.0+0x2c7/0x460 [ 116.235965] report_bug.cold+0x72/0xab [ 116.235991] handle_bug+0x3c/0x70 [ 116.236015] exc_invalid_op+0x14/0x50 [ 116.236040] asm_exc_invalid_op+0x16/0x20 [ 116.236058] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 116.236086] Code: 5e 41 5f e9 8b ae ef ff e8 86 ae ef ff 65 8b 1d 0b 18 ac 7e 31 ff 89 de e8 26 ab ef ff 85 db 0f 84 8a 00 00 00 e8 69 ae ef ff <0f> 0b e9 a5 fe ff ff e8 5d ae ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 116.236101] RSP: 0018:ffff88803f467c48 EFLAGS: 00010006 [ 116.236114] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 116.236124] RDX: ffff888015eab580 RSI: ffffffff81565dc7 RDI: 0000000000000005 [ 116.236134] RBP: ffff8880086605c8 R08: 0000000000000005 R09: 0000000000000001 [ 116.236144] R10: 0000000000000000 R11: ffffffff865b401b R12: ffff88800ee21400 [ 116.236155] R13: ffff88806ce3d2c0 R14: ffffffff8547d160 R15: 0000000000000002 [ 116.236170] ? group_sched_out.part.0+0x2c7/0x460 [ 116.236198] ? group_sched_out.part.0+0x2c7/0x460 [ 116.236225] ctx_sched_out+0x8f1/0xc10 [ 116.236252] __perf_event_task_sched_out+0x6d0/0x18d0 [ 116.236272] ? lock_is_held_type+0xd7/0x130 [ 116.236291] ? __perf_cgroup_move+0x160/0x160 [ 116.236305] ? set_next_entity+0x304/0x550 [ 116.236330] ? update_curr+0x267/0x740 [ 116.236355] ? lock_is_held_type+0xd7/0x130 [ 116.236374] __schedule+0xedd/0x2470 [ 116.236398] ? io_schedule_timeout+0x150/0x150 [ 116.236421] ? rcu_read_lock_sched_held+0x3e/0x80 [ 116.236449] schedule+0xda/0x1b0 [ 116.236470] exit_to_user_mode_prepare+0x114/0x1a0 [ 116.236487] syscall_exit_to_user_mode+0x19/0x40 [ 116.236506] do_syscall_64+0x48/0x90 [ 116.236530] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 116.236548] RIP: 0033:0x7f8613aa0b19 [ 116.236559] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 116.236574] RSP: 002b:00007f8611016218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 116.236589] RAX: 0000000000000001 RBX: 00007f8613bb3f68 RCX: 00007f8613aa0b19 [ 116.236599] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f8613bb3f6c [ 116.236609] RBP: 00007f8613bb3f60 R08: 000000000000000e R09: 0000000000000000 [ 116.236619] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f8613bb3f6c [ 116.236629] R13: 00007fffe9ee740f R14: 00007f8611016300 R15: 0000000000022000 [ 116.236646] [ 116.295363] WARNING: CPU: 0 PID: 3973 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 116.296047] Modules linked in: [ 116.296291] CPU: 0 PID: 3973 Comm: syz-executor.7 Not tainted 6.0.0-rc7-next-20220930 #1 [ 116.296902] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 116.297724] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 116.298131] Code: 5e 41 5f e9 8b ae ef ff e8 86 ae ef ff 65 8b 1d 0b 18 ac 7e 31 ff 89 de e8 26 ab ef ff 85 db 0f 84 8a 00 00 00 e8 69 ae ef ff <0f> 0b e9 a5 fe ff ff e8 5d ae ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 116.299479] RSP: 0018:ffff88803f467c48 EFLAGS: 00010006 [ 116.299858] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 116.300368] RDX: ffff888015eab580 RSI: ffffffff81565dc7 RDI: 0000000000000005 [ 116.300900] RBP: ffff8880086605c8 R08: 0000000000000005 R09: 0000000000000001 [ 116.301438] R10: 0000000000000000 R11: ffffffff865b401b R12: ffff88800ee21400 [ 116.301953] R13: ffff88806ce3d2c0 R14: ffffffff8547d160 R15: 0000000000000002 [ 116.302486] FS: 00007f8611016700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 116.303087] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 116.303517] CR2: 00007f6393d2c010 CR3: 000000000f51e000 CR4: 0000000000350ef0 [ 116.304049] Call Trace: [ 116.304242] [ 116.304415] ctx_sched_out+0x8f1/0xc10 [ 116.304728] __perf_event_task_sched_out+0x6d0/0x18d0 [ 116.305122] ? lock_is_held_type+0xd7/0x130 [ 116.305447] ? __perf_cgroup_move+0x160/0x160 [ 116.305789] ? set_next_entity+0x304/0x550 [ 116.306116] ? update_curr+0x267/0x740 [ 116.306420] ? lock_is_held_type+0xd7/0x130 [ 116.306751] __schedule+0xedd/0x2470 [ 116.307042] ? io_schedule_timeout+0x150/0x150 [ 116.307392] ? rcu_read_lock_sched_held+0x3e/0x80 [ 116.307762] schedule+0xda/0x1b0 [ 116.308026] exit_to_user_mode_prepare+0x114/0x1a0 [ 116.308397] syscall_exit_to_user_mode+0x19/0x40 [ 116.308764] do_syscall_64+0x48/0x90 [ 116.309057] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 116.309452] RIP: 0033:0x7f8613aa0b19 [ 116.309736] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 116.311078] RSP: 002b:00007f8611016218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 116.311641] RAX: 0000000000000001 RBX: 00007f8613bb3f68 RCX: 00007f8613aa0b19 [ 116.312165] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f8613bb3f6c [ 116.312709] RBP: 00007f8613bb3f60 R08: 000000000000000e R09: 0000000000000000 [ 116.313242] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f8613bb3f6c [ 116.313771] R13: 00007fffe9ee740f R14: 00007f8611016300 R15: 0000000000022000 [ 116.314309] [ 116.314489] irq event stamp: 2044 [ 116.314743] hardirqs last enabled at (2043): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 116.315436] hardirqs last disabled at (2044): [] __schedule+0x1225/0x2470 [ 116.316066] softirqs last enabled at (1800): [] __irq_exit_rcu+0x11b/0x180 [ 116.316716] softirqs last disabled at (1791): [] __irq_exit_rcu+0x11b/0x180 [ 116.317349] ---[ end trace 0000000000000000 ]--- [ 116.408057] hrtimer: interrupt took 17923 ns 01:59:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f00000000c0)=0x300) 01:59:27 executing program 6: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000003580)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[{0x10, 0x1, 0x2}], 0x10}}], 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = dup(r1) sendmsg$nl_xfrm(r2, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000000)=ANY=[@ANYBLOB="681100001c00018201b87f5001533eff132c0029bd7000fcdbdf2533"], 0x1168}}, 0x0) 01:59:27 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000ac0), 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000000)=""/240) 01:59:27 executing program 1: keyctl$KEYCTL_CAPABILITIES(0x8, 0x0, 0xfffffffffffffda5) 01:59:27 executing program 4: prctl$PR_SET_MM(0x2f, 0x0, &(0x7f0000ff6000/0x1000)=nil) 01:59:27 executing program 2: syz_emit_ethernet(0x46, &(0x7f0000001400)={@multicast, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '#\x00\b', 0x10, 0x2c, 0x0, @empty, @local, {[], {0x0, 0xfffc, 0x10, 0x0, @opaque="44e67c344da1a96c"}}}}}}, 0x0) 01:59:27 executing program 5: move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x6) 01:59:27 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) r3 = accept4$inet6(r1, 0x0, &(0x7f0000000380), 0x80400) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x3, @remote, 0x81}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r4, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x165c02, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}], 0x4, 0x0, 0x4) [ 116.480956] netlink: 4436 bytes leftover after parsing attributes in process `syz-executor.6'. 01:59:27 executing program 5: move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x6) 01:59:27 executing program 1: keyctl$KEYCTL_CAPABILITIES(0x8, 0x0, 0xfffffffffffffda5) 01:59:27 executing program 2: syz_emit_ethernet(0x46, &(0x7f0000001400)={@multicast, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '#\x00\b', 0x10, 0x2c, 0x0, @empty, @local, {[], {0x0, 0xfffc, 0x10, 0x0, @opaque="44e67c344da1a96c"}}}}}}, 0x0) 01:59:27 executing program 4: prctl$PR_SET_MM(0x2f, 0x0, &(0x7f0000ff6000/0x1000)=nil) 01:59:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f00000000c0)=0x300) 01:59:27 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) r3 = accept4$inet6(r1, 0x0, &(0x7f0000000380), 0x80400) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x3, @remote, 0x81}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r4, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x165c02, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}], 0x4, 0x0, 0x4) 01:59:27 executing program 6: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000003580)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[{0x10, 0x1, 0x2}], 0x10}}], 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = dup(r1) sendmsg$nl_xfrm(r2, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000000)=ANY=[@ANYBLOB="681100001c00018201b87f5001533eff132c0029bd7000fcdbdf2533"], 0x1168}}, 0x0) 01:59:27 executing program 5: move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x6) 01:59:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f00000000c0)=0x300) 01:59:27 executing program 1: keyctl$KEYCTL_CAPABILITIES(0x8, 0x0, 0xfffffffffffffda5) 01:59:27 executing program 4: prctl$PR_SET_MM(0x2f, 0x0, &(0x7f0000ff6000/0x1000)=nil) 01:59:27 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000ac0), 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000000)=""/240) [ 116.609731] netlink: 4436 bytes leftover after parsing attributes in process `syz-executor.6'. 01:59:27 executing program 1: keyctl$KEYCTL_CAPABILITIES(0x8, 0x0, 0xfffffffffffffda5) 01:59:27 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000ac0), 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000000)=""/240) 01:59:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f00000000c0)=0x300) 01:59:27 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) r3 = accept4$inet6(r1, 0x0, &(0x7f0000000380), 0x80400) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x3, @remote, 0x81}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r4, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x165c02, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}], 0x4, 0x0, 0x4) 01:59:27 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) r3 = accept4$inet6(r1, 0x0, &(0x7f0000000380), 0x80400) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x3, @remote, 0x81}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r4, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x165c02, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}], 0x4, 0x0, 0x4) 01:59:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f00000000c0)=0x300) 01:59:27 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) r3 = accept4$inet6(r1, 0x0, &(0x7f0000000380), 0x80400) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x3, @remote, 0x81}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r4, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x165c02, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}], 0x4, 0x0, 0x4) 01:59:27 executing program 6: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000003580)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[{0x10, 0x1, 0x2}], 0x10}}], 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = dup(r1) sendmsg$nl_xfrm(r2, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000000)=ANY=[@ANYBLOB="681100001c00018201b87f5001533eff132c0029bd7000fcdbdf2533"], 0x1168}}, 0x0) 01:59:27 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) r3 = accept4$inet6(r1, 0x0, &(0x7f0000000380), 0x80400) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x3, @remote, 0x81}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r4, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x165c02, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}], 0x4, 0x0, 0x4) 01:59:27 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) r3 = accept4$inet6(r1, 0x0, &(0x7f0000000380), 0x80400) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x3, @remote, 0x81}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r4, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x165c02, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}], 0x4, 0x0, 0x4) 01:59:27 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) r3 = accept4$inet6(r1, 0x0, &(0x7f0000000380), 0x80400) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x3, @remote, 0x81}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r4, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x165c02, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}], 0x4, 0x0, 0x4) 01:59:27 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) r3 = accept4$inet6(r1, 0x0, &(0x7f0000000380), 0x80400) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x3, @remote, 0x81}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r4, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x165c02, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}], 0x4, 0x0, 0x4) 01:59:27 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) r3 = accept4$inet6(r1, 0x0, &(0x7f0000000380), 0x80400) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x3, @remote, 0x81}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r4, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x165c02, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}], 0x4, 0x0, 0x4) [ 116.825441] netlink: 4436 bytes leftover after parsing attributes in process `syz-executor.6'. 01:59:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f00000000c0)=0x300) 01:59:28 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) r3 = accept4$inet6(r1, 0x0, &(0x7f0000000380), 0x80400) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x3, @remote, 0x81}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r4, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x165c02, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}], 0x4, 0x0, 0x4) 01:59:28 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) r3 = accept4$inet6(r1, 0x0, &(0x7f0000000380), 0x80400) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x3, @remote, 0x81}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r4, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x165c02, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}], 0x4, 0x0, 0x4) 01:59:28 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) r3 = accept4$inet6(r1, 0x0, &(0x7f0000000380), 0x80400) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x3, @remote, 0x81}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r4, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x165c02, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}], 0x4, 0x0, 0x4) 01:59:28 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) r3 = accept4$inet6(r1, 0x0, &(0x7f0000000380), 0x80400) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x3, @remote, 0x81}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r4, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x165c02, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}], 0x4, 0x0, 0x4) 01:59:28 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) r3 = accept4$inet6(r1, 0x0, &(0x7f0000000380), 0x80400) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x3, @remote, 0x81}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r4, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x165c02, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}], 0x4, 0x0, 0x4) 01:59:28 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) r3 = accept4$inet6(r1, 0x0, &(0x7f0000000380), 0x80400) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x3, @remote, 0x81}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r4, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x165c02, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}], 0x4, 0x0, 0x4) 01:59:28 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) r3 = accept4$inet6(r1, 0x0, &(0x7f0000000380), 0x80400) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x3, @remote, 0x81}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r4, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x165c02, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}], 0x4, 0x0, 0x4) 01:59:28 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) r3 = accept4$inet6(r1, 0x0, &(0x7f0000000380), 0x80400) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x3, @remote, 0x81}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r4, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x165c02, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}], 0x4, 0x0, 0x4) 01:59:28 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) r3 = accept4$inet6(r1, 0x0, &(0x7f0000000380), 0x80400) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x3, @remote, 0x81}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r4, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x165c02, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}], 0x4, 0x0, 0x4) 01:59:28 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) r3 = accept4$inet6(r1, 0x0, &(0x7f0000000380), 0x80400) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x3, @remote, 0x81}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r4, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x165c02, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}], 0x4, 0x0, 0x4) 01:59:28 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000003580)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[{0x10, 0x1, 0x2}], 0x10}}], 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = dup(r1) sendmsg$nl_xfrm(r2, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000000)=ANY=[@ANYBLOB="681100001c00018201b87f5001533eff132c0029bd7000fcdbdf2533"], 0x1168}}, 0x0) [ 117.125887] netlink: 4436 bytes leftover after parsing attributes in process `syz-executor.5'. 01:59:28 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000003580)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[{0x10, 0x1, 0x2}], 0x10}}], 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = dup(r1) sendmsg$nl_xfrm(r2, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000000)=ANY=[@ANYBLOB="681100001c00018201b87f5001533eff132c0029bd7000fcdbdf2533"], 0x1168}}, 0x0) [ 117.162631] netlink: 4436 bytes leftover after parsing attributes in process `syz-executor.5'. 01:59:28 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000003580)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[{0x10, 0x1, 0x2}], 0x10}}], 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = dup(r1) sendmsg$nl_xfrm(r2, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000000)=ANY=[@ANYBLOB="681100001c00018201b87f5001533eff132c0029bd7000fcdbdf2533"], 0x1168}}, 0x0) [ 117.192553] netlink: 4436 bytes leftover after parsing attributes in process `syz-executor.5'. 01:59:28 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) r3 = accept4$inet6(r1, 0x0, &(0x7f0000000380), 0x80400) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x3, @remote, 0x81}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r4, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x165c02, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}], 0x4, 0x0, 0x4) 01:59:28 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) r3 = accept4$inet6(r1, 0x0, &(0x7f0000000380), 0x80400) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x3, @remote, 0x81}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r4, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x165c02, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}], 0x4, 0x0, 0x4) 01:59:28 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) r3 = accept4$inet6(r1, 0x0, &(0x7f0000000380), 0x80400) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x3, @remote, 0x81}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r4, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x165c02, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}], 0x4, 0x0, 0x4) 01:59:28 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) r3 = accept4$inet6(r1, 0x0, &(0x7f0000000380), 0x80400) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x3, @remote, 0x81}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r4, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x165c02, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}], 0x4, 0x0, 0x4) 01:59:28 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) r3 = accept4$inet6(r1, 0x0, &(0x7f0000000380), 0x80400) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x3, @remote, 0x81}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r4, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x165c02, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}], 0x4, 0x0, 0x4) 01:59:28 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) r3 = accept4$inet6(r1, 0x0, &(0x7f0000000380), 0x80400) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x3, @remote, 0x81}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r4, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x165c02, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}], 0x4, 0x0, 0x4) 01:59:28 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) r3 = accept4$inet6(r1, 0x0, &(0x7f0000000380), 0x80400) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x3, @remote, 0x81}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r4, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x165c02, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}], 0x4, 0x0, 0x4) 01:59:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000a940)=[{&(0x7f0000000440)={0x1c, 0x5e, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x1}, @generic="ba"]}, 0x1c}], 0x1}, 0x0) 01:59:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000a940)=[{&(0x7f0000000440)={0x1c, 0x5e, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x1}, @generic="ba"]}, 0x1c}], 0x1}, 0x0) 01:59:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000a940)=[{&(0x7f0000000440)={0x1c, 0x5e, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x1}, @generic="ba"]}, 0x1c}], 0x1}, 0x0) 01:59:28 executing program 6: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000240), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f00000000c0)={0x10000, 0x0, 0xfffffffd}) 01:59:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000a940)=[{&(0x7f0000000440)={0x1c, 0x5e, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x1}, @generic="ba"]}, 0x1c}], 0x1}, 0x0) 01:59:28 executing program 6: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000240), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f00000000c0)={0x10000, 0x0, 0xfffffffd}) 01:59:28 executing program 6: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000240), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f00000000c0)={0x10000, 0x0, 0xfffffffd}) 01:59:28 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000240), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f00000000c0)={0x10000, 0x0, 0xfffffffd}) 01:59:28 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) r3 = accept4$inet6(r1, 0x0, &(0x7f0000000380), 0x80400) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x3, @remote, 0x81}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r4, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x165c02, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}], 0x4, 0x0, 0x4) 01:59:28 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) r3 = accept4$inet6(r1, 0x0, &(0x7f0000000380), 0x80400) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x3, @remote, 0x81}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r4, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x165c02, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}], 0x4, 0x0, 0x4) 01:59:28 executing program 6: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000240), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f00000000c0)={0x10000, 0x0, 0xfffffffd}) 01:59:28 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) r3 = accept4$inet6(r1, 0x0, &(0x7f0000000380), 0x80400) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x3, @remote, 0x81}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r4, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x165c02, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}], 0x4, 0x0, 0x4) 01:59:28 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000240), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f00000000c0)={0x10000, 0x0, 0xfffffffd}) 01:59:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)={0x18, 0x5f, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}, 0x18}], 0x1}, 0x0) 01:59:28 executing program 0: sendmsg$DEVLINK_CMD_RATE_DEL(0xffffffffffffffff, 0x0, 0x0) 01:59:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)={0x18, 0x5f, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}, 0x18}], 0x1}, 0x0) 01:59:28 executing program 2: accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000040)=0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_setup(0x8b5, &(0x7f00000011c0)={0x0, 0x3e9e, 0x1, 0x1, 0x236}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000001240), &(0x7f0000001280)) 01:59:28 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000240), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f00000000c0)={0x10000, 0x0, 0xfffffffd}) 01:59:28 executing program 1: getrandom(&(0x7f0000000000)=""/83, 0x53, 0x0) 01:59:28 executing program 0: setgroups(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002780)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f0000000100)) [ 117.669117] syz-executor.4 uses obsolete (PF_INET,SOCK_PACKET) 01:59:28 executing program 6: r0 = semget(0x1, 0x2, 0x2b5) semget$private(0x0, 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 01:59:28 executing program 4: socketpair(0x2, 0xa, 0x0, &(0x7f0000002980)) 01:59:28 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_bp={0x0, 0xb}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_io_uring_setup(0x33d, &(0x7f0000000200)={0x0, 0x0, 0x2, 0x2, 0x38a}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000380), &(0x7f0000000800)) syz_io_uring_setup(0x64b8, &(0x7f0000000140)={0x0, 0xf28c, 0x1, 0x2, 0x3bb}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000003c0)) 01:59:28 executing program 2: accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000040)=0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_setup(0x8b5, &(0x7f00000011c0)={0x0, 0x3e9e, 0x1, 0x1, 0x236}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000001240), &(0x7f0000001280)) 01:59:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)={0x18, 0x5f, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}, 0x18}], 0x1}, 0x0) 01:59:28 executing program 1: getrandom(&(0x7f0000000000)=""/83, 0x53, 0x0) 01:59:28 executing program 0: setgroups(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002780)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f0000000100)) 01:59:28 executing program 4: socketpair(0x2, 0xa, 0x0, &(0x7f0000002980)) 01:59:28 executing program 5: setgroups(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002780)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f0000000100)) 01:59:28 executing program 6: r0 = semget(0x1, 0x2, 0x2b5) semget$private(0x0, 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 01:59:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)={0x18, 0x5f, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}, 0x18}], 0x1}, 0x0) 01:59:28 executing program 2: accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000040)=0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_setup(0x8b5, &(0x7f00000011c0)={0x0, 0x3e9e, 0x1, 0x1, 0x236}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000001240), &(0x7f0000001280)) 01:59:28 executing program 1: getrandom(&(0x7f0000000000)=""/83, 0x53, 0x0) 01:59:28 executing program 5: setgroups(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002780)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f0000000100)) 01:59:28 executing program 4: socketpair(0x2, 0xa, 0x0, &(0x7f0000002980)) 01:59:29 executing program 0: setgroups(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002780)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f0000000100)) 01:59:29 executing program 3: r0 = semget(0x1, 0x2, 0x2b5) semget$private(0x0, 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 01:59:29 executing program 2: accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000040)=0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_setup(0x8b5, &(0x7f00000011c0)={0x0, 0x3e9e, 0x1, 0x1, 0x236}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000001240), &(0x7f0000001280)) 01:59:29 executing program 4: socketpair(0x2, 0xa, 0x0, &(0x7f0000002980)) 01:59:29 executing program 6: r0 = semget(0x1, 0x2, 0x2b5) semget$private(0x0, 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 01:59:29 executing program 1: getrandom(&(0x7f0000000000)=""/83, 0x53, 0x0) 01:59:29 executing program 5: setgroups(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002780)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f0000000100)) 01:59:29 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_bp={0x0, 0xb}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_io_uring_setup(0x33d, &(0x7f0000000200)={0x0, 0x0, 0x2, 0x2, 0x38a}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000380), &(0x7f0000000800)) syz_io_uring_setup(0x64b8, &(0x7f0000000140)={0x0, 0xf28c, 0x1, 0x2, 0x3bb}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000003c0)) 01:59:29 executing program 0: setgroups(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002780)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f0000000100)) 01:59:29 executing program 6: r0 = semget(0x1, 0x2, 0x2b5) semget$private(0x0, 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 01:59:29 executing program 3: r0 = semget(0x1, 0x2, 0x2b5) semget$private(0x0, 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 01:59:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_bp={0x0, 0xb}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_io_uring_setup(0x33d, &(0x7f0000000200)={0x0, 0x0, 0x2, 0x2, 0x38a}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000380), &(0x7f0000000800)) syz_io_uring_setup(0x64b8, &(0x7f0000000140)={0x0, 0xf28c, 0x1, 0x2, 0x3bb}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000003c0)) 01:59:29 executing program 3: r0 = semget(0x1, 0x2, 0x2b5) semget$private(0x0, 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 01:59:29 executing program 2: r0 = semget(0x1, 0x2, 0x2b5) semget$private(0x0, 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 01:59:29 executing program 5: accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000040)=0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_setup(0x8b5, &(0x7f00000011c0)={0x0, 0x3e9e, 0x1, 0x1, 0x236}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000001240), &(0x7f0000001280)) 01:59:29 executing program 2: r0 = semget(0x1, 0x2, 0x2b5) semget$private(0x0, 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 01:59:30 executing program 4: openat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x3ff) creat(&(0x7f0000000940)='./file0\x00', 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000001fc0), 0x0, 0x0, 0x7, &(0x7f0000003540)=[{&(0x7f0000002040)="de37fe5096d259ab0117e16bb91f70c862a3f109a4698397a084c0ea8779ecaf3ca7ab5ca3625bfcba242456fbe6f6b0692100d2eea6a2de9ae85b700e03321d09812a7a1368380b7f0c", 0x4a}, {&(0x7f00000020c0)="fcdac1806b49a5f879ce1c9f44348cb72836fb9e070c104162bade7da0078c855a7bf65949525905c75189ef95ba6a9e3722605bcc67a7c09000cdc75458a9eeba218df73e07a42ea6b27d3edc88cdc83e10c08e9008d8f8b838e29295ecdc1b1fefb91436ef3c218557bb354c18f857ebffa85ceadbe922eb07e9677a0cdacee8108e7a509b3a6ddac58141c89642fb030937eac46fd1df86473c8fb9af1c27ed7b83857d73a3bcf86800e54ecf1f9eed20fd49413dbd666b8b5ae8df16518ec743f65077", 0xc5, 0x1}, {&(0x7f00000021c0)="0a8aa5e0e5513048a31e54d448cf1b5d2aa81421c1acc6da4becc92a19d0fd8283d6887f07549a89ba674adffb9137e50f86cba7c2b9f1f3d4cb0185991bf576c274d80f51372f01b8ac08cfdf334b2f59b4c8b8", 0x54, 0x1}, {0x0, 0x0, 0x1}, {&(0x7f00000022c0)="8c5d0aa58ae4ab24fe45a548306c195b2d604620f0b0c2d60ad369b0d5f95d1bd3e137df3e8250ef771ec4e047247a3db7b4c3ade1b6545f2d1f151b5f7f29483f0299cf7dfba7117dfc6634537e4eb6f288e2ed6fdf1fb7a399dfb21548fc1e0bdfa2a84a2718c0e6abeeded2d1df1d6b26ebca1234a49a801655ffe859265a6403a6124fc44d80cc186604d415e68ad67b015adc98854f4d8d90cabac41c08f0706339a95d", 0xa6, 0x8}, {&(0x7f0000002380)}, {&(0x7f00000024c0), 0x0, 0x6}], 0x509b66f1b417291c, &(0x7f0000003640)={[{'mcast_rejoin_count\x00'}, {}, {'lb_tx_method\x00'}, {'bpf_hash_func\x00'}, {'mcast_rejoin_count\x00'}], [{@permit_directio}, {@fsname={'fsname', 0x3d, '\\'}}]}) clock_gettime(0x0, &(0x7f0000003e00)) ioprio_get$pid(0x2, 0x0) llistxattr(&(0x7f0000003f00)='./file0\x00', &(0x7f0000003f40)=""/199, 0xc7) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000004040)) 01:59:30 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_bp={0x0, 0xb}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_io_uring_setup(0x33d, &(0x7f0000000200)={0x0, 0x0, 0x2, 0x2, 0x38a}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000380), &(0x7f0000000800)) syz_io_uring_setup(0x64b8, &(0x7f0000000140)={0x0, 0xf28c, 0x1, 0x2, 0x3bb}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000003c0)) 01:59:30 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x80000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400028001000470000004f801002000400003000000000000008000295d20d2f153595a4b414c4c4552202046415431362020200e1fbe5b7cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a00", 0xc0}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8fffffff0ffffffffffffff00"/64, 0x40, 0x1e0}, {&(0x7f0000010200)="f8fffffff0ffffffffffffff00"/32, 0x20, 0x400}, {&(0x7f0000010300)="f8fffffff0ffffffffffffff00"/32, 0x20, 0x600}, {&(0x7f0000010400)="f8fffffff0ffffffffffffff00"/32, 0x20, 0x800}, {&(0x7f0000010500)="53595a4b414c4c45522020080000ec80325132510000ec80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020100080ec70325132510000ec70325103000000000041660069006c00650031000f00100000ffffffffffffffffffff0000ffffffff46494c4531202020202020200080ec70325132510000ec70325105000a00000041660069006c00650032000f00140000ffffffffffffffffffff0000ffffffff46494c4532202020202020200080ec70325132510000ec70325106002823000041660069006c0065002e000f00d263006f006c0064000000ffff0000ffffffff46494c457e312020434f4c200080ec70325132510000ec703251070064000000", 0x120, 0xa00}, {&(0x7f0000010700)="2e20202020202020202020100080ec70325132510000ec7032510300000000002e2e202020202020202020100080ec70325132510000ec70325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020200080ec70325132510000ec70325104001a040000", 0x80, 0x11800}, {&(0x7f0000010800)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x21800}, {&(0x7f0000010d00)='syzkallers\x00'/32, 0x20, 0x31800}, {&(0x7f0000010e00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x51800}], 0x0, &(0x7f0000010f00)) 01:59:30 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_bp={0x0, 0xb}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_io_uring_setup(0x33d, &(0x7f0000000200)={0x0, 0x0, 0x2, 0x2, 0x38a}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000380), &(0x7f0000000800)) syz_io_uring_setup(0x64b8, &(0x7f0000000140)={0x0, 0xf28c, 0x1, 0x2, 0x3bb}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000003c0)) 01:59:30 executing program 2: r0 = semget(0x1, 0x2, 0x2b5) semget$private(0x0, 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 01:59:30 executing program 6: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) ioctl$sock_SIOCINQ(r0, 0x89e0, 0x0) [ 119.054922] loop0: detected capacity change from 0 to 1304 01:59:30 executing program 5: accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000040)=0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_setup(0x8b5, &(0x7f00000011c0)={0x0, 0x3e9e, 0x1, 0x1, 0x236}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000001240), &(0x7f0000001280)) 01:59:30 executing program 3: syz_emit_ethernet(0x26, &(0x7f0000000000)={@remote, @link_local, @void, {@arp={0x4305, @generic={0x30f, 0x0, 0x6, 0x0, 0x0, @link_local, "", @remote, "4815e7a6"}}}}, 0x0) [ 119.804483] loop0: detected capacity change from 0 to 1304 01:59:30 executing program 3: syz_emit_ethernet(0x26, &(0x7f0000000000)={@remote, @link_local, @void, {@arp={0x4305, @generic={0x30f, 0x0, 0x6, 0x0, 0x0, @link_local, "", @remote, "4815e7a6"}}}}, 0x0) 01:59:30 executing program 5: accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000040)=0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_setup(0x8b5, &(0x7f00000011c0)={0x0, 0x3e9e, 0x1, 0x1, 0x236}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000001240), &(0x7f0000001280)) 01:59:30 executing program 6: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) ioctl$sock_SIOCINQ(r0, 0x89e0, 0x0) 01:59:30 executing program 4: openat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x3ff) creat(&(0x7f0000000940)='./file0\x00', 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000001fc0), 0x0, 0x0, 0x7, &(0x7f0000003540)=[{&(0x7f0000002040)="de37fe5096d259ab0117e16bb91f70c862a3f109a4698397a084c0ea8779ecaf3ca7ab5ca3625bfcba242456fbe6f6b0692100d2eea6a2de9ae85b700e03321d09812a7a1368380b7f0c", 0x4a}, {&(0x7f00000020c0)="fcdac1806b49a5f879ce1c9f44348cb72836fb9e070c104162bade7da0078c855a7bf65949525905c75189ef95ba6a9e3722605bcc67a7c09000cdc75458a9eeba218df73e07a42ea6b27d3edc88cdc83e10c08e9008d8f8b838e29295ecdc1b1fefb91436ef3c218557bb354c18f857ebffa85ceadbe922eb07e9677a0cdacee8108e7a509b3a6ddac58141c89642fb030937eac46fd1df86473c8fb9af1c27ed7b83857d73a3bcf86800e54ecf1f9eed20fd49413dbd666b8b5ae8df16518ec743f65077", 0xc5, 0x1}, {&(0x7f00000021c0)="0a8aa5e0e5513048a31e54d448cf1b5d2aa81421c1acc6da4becc92a19d0fd8283d6887f07549a89ba674adffb9137e50f86cba7c2b9f1f3d4cb0185991bf576c274d80f51372f01b8ac08cfdf334b2f59b4c8b8", 0x54, 0x1}, {0x0, 0x0, 0x1}, {&(0x7f00000022c0)="8c5d0aa58ae4ab24fe45a548306c195b2d604620f0b0c2d60ad369b0d5f95d1bd3e137df3e8250ef771ec4e047247a3db7b4c3ade1b6545f2d1f151b5f7f29483f0299cf7dfba7117dfc6634537e4eb6f288e2ed6fdf1fb7a399dfb21548fc1e0bdfa2a84a2718c0e6abeeded2d1df1d6b26ebca1234a49a801655ffe859265a6403a6124fc44d80cc186604d415e68ad67b015adc98854f4d8d90cabac41c08f0706339a95d", 0xa6, 0x8}, {&(0x7f0000002380)}, {&(0x7f00000024c0), 0x0, 0x6}], 0x509b66f1b417291c, &(0x7f0000003640)={[{'mcast_rejoin_count\x00'}, {}, {'lb_tx_method\x00'}, {'bpf_hash_func\x00'}, {'mcast_rejoin_count\x00'}], [{@permit_directio}, {@fsname={'fsname', 0x3d, '\\'}}]}) clock_gettime(0x0, &(0x7f0000003e00)) ioprio_get$pid(0x2, 0x0) llistxattr(&(0x7f0000003f00)='./file0\x00', &(0x7f0000003f40)=""/199, 0xc7) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000004040)) 01:59:30 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x80000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400028001000470000004f801002000400003000000000000008000295d20d2f153595a4b414c4c4552202046415431362020200e1fbe5b7cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a00", 0xc0}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8fffffff0ffffffffffffff00"/64, 0x40, 0x1e0}, {&(0x7f0000010200)="f8fffffff0ffffffffffffff00"/32, 0x20, 0x400}, {&(0x7f0000010300)="f8fffffff0ffffffffffffff00"/32, 0x20, 0x600}, {&(0x7f0000010400)="f8fffffff0ffffffffffffff00"/32, 0x20, 0x800}, {&(0x7f0000010500)="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", 0x120, 0xa00}, {&(0x7f0000010700)="2e20202020202020202020100080ec70325132510000ec7032510300000000002e2e202020202020202020100080ec70325132510000ec70325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020200080ec70325132510000ec70325104001a040000", 0x80, 0x11800}, {&(0x7f0000010800)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x21800}, {&(0x7f0000010d00)='syzkallers\x00'/32, 0x20, 0x31800}, {&(0x7f0000010e00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x51800}], 0x0, &(0x7f0000010f00)) 01:59:31 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) ioctl$sock_SIOCINQ(r0, 0x89e0, 0x0) 01:59:31 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_bp={0x0, 0xb}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_io_uring_setup(0x33d, &(0x7f0000000200)={0x0, 0x0, 0x2, 0x2, 0x38a}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000380), &(0x7f0000000800)) syz_io_uring_setup(0x64b8, &(0x7f0000000140)={0x0, 0xf28c, 0x1, 0x2, 0x3bb}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000003c0)) 01:59:31 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_bp={0x0, 0xb}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_io_uring_setup(0x33d, &(0x7f0000000200)={0x0, 0x0, 0x2, 0x2, 0x38a}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000380), &(0x7f0000000800)) syz_io_uring_setup(0x64b8, &(0x7f0000000140)={0x0, 0xf28c, 0x1, 0x2, 0x3bb}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000003c0)) 01:59:31 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x80000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400028001000470000004f801002000400003000000000000008000295d20d2f153595a4b414c4c4552202046415431362020200e1fbe5b7cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a00", 0xc0}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8fffffff0ffffffffffffff00"/64, 0x40, 0x1e0}, {&(0x7f0000010200)="f8fffffff0ffffffffffffff00"/32, 0x20, 0x400}, {&(0x7f0000010300)="f8fffffff0ffffffffffffff00"/32, 0x20, 0x600}, {&(0x7f0000010400)="f8fffffff0ffffffffffffff00"/32, 0x20, 0x800}, {&(0x7f0000010500)="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", 0x120, 0xa00}, {&(0x7f0000010700)="2e20202020202020202020100080ec70325132510000ec7032510300000000002e2e202020202020202020100080ec70325132510000ec70325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020200080ec70325132510000ec70325104001a040000", 0x80, 0x11800}, {&(0x7f0000010800)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x21800}, {&(0x7f0000010d00)='syzkallers\x00'/32, 0x20, 0x31800}, {&(0x7f0000010e00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x51800}], 0x0, &(0x7f0000010f00)) 01:59:31 executing program 3: syz_emit_ethernet(0x26, &(0x7f0000000000)={@remote, @link_local, @void, {@arp={0x4305, @generic={0x30f, 0x0, 0x6, 0x0, 0x0, @link_local, "", @remote, "4815e7a6"}}}}, 0x0) 01:59:31 executing program 6: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) ioctl$sock_SIOCINQ(r0, 0x89e0, 0x0) 01:59:31 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) ioctl$sock_SIOCINQ(r0, 0x89e0, 0x0) [ 119.914808] loop0: detected capacity change from 0 to 1304 01:59:31 executing program 4: openat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x3ff) creat(&(0x7f0000000940)='./file0\x00', 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000001fc0), 0x0, 0x0, 0x7, &(0x7f0000003540)=[{&(0x7f0000002040)="de37fe5096d259ab0117e16bb91f70c862a3f109a4698397a084c0ea8779ecaf3ca7ab5ca3625bfcba242456fbe6f6b0692100d2eea6a2de9ae85b700e03321d09812a7a1368380b7f0c", 0x4a}, {&(0x7f00000020c0)="fcdac1806b49a5f879ce1c9f44348cb72836fb9e070c104162bade7da0078c855a7bf65949525905c75189ef95ba6a9e3722605bcc67a7c09000cdc75458a9eeba218df73e07a42ea6b27d3edc88cdc83e10c08e9008d8f8b838e29295ecdc1b1fefb91436ef3c218557bb354c18f857ebffa85ceadbe922eb07e9677a0cdacee8108e7a509b3a6ddac58141c89642fb030937eac46fd1df86473c8fb9af1c27ed7b83857d73a3bcf86800e54ecf1f9eed20fd49413dbd666b8b5ae8df16518ec743f65077", 0xc5, 0x1}, {&(0x7f00000021c0)="0a8aa5e0e5513048a31e54d448cf1b5d2aa81421c1acc6da4becc92a19d0fd8283d6887f07549a89ba674adffb9137e50f86cba7c2b9f1f3d4cb0185991bf576c274d80f51372f01b8ac08cfdf334b2f59b4c8b8", 0x54, 0x1}, {0x0, 0x0, 0x1}, {&(0x7f00000022c0)="8c5d0aa58ae4ab24fe45a548306c195b2d604620f0b0c2d60ad369b0d5f95d1bd3e137df3e8250ef771ec4e047247a3db7b4c3ade1b6545f2d1f151b5f7f29483f0299cf7dfba7117dfc6634537e4eb6f288e2ed6fdf1fb7a399dfb21548fc1e0bdfa2a84a2718c0e6abeeded2d1df1d6b26ebca1234a49a801655ffe859265a6403a6124fc44d80cc186604d415e68ad67b015adc98854f4d8d90cabac41c08f0706339a95d", 0xa6, 0x8}, {&(0x7f0000002380)}, {&(0x7f00000024c0), 0x0, 0x6}], 0x509b66f1b417291c, &(0x7f0000003640)={[{'mcast_rejoin_count\x00'}, {}, {'lb_tx_method\x00'}, {'bpf_hash_func\x00'}, {'mcast_rejoin_count\x00'}], [{@permit_directio}, {@fsname={'fsname', 0x3d, '\\'}}]}) clock_gettime(0x0, &(0x7f0000003e00)) ioprio_get$pid(0x2, 0x0) llistxattr(&(0x7f0000003f00)='./file0\x00', &(0x7f0000003f40)=""/199, 0xc7) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000004040)) 01:59:31 executing program 5: openat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x3ff) creat(&(0x7f0000000940)='./file0\x00', 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000001fc0), 0x0, 0x0, 0x7, &(0x7f0000003540)=[{&(0x7f0000002040)="de37fe5096d259ab0117e16bb91f70c862a3f109a4698397a084c0ea8779ecaf3ca7ab5ca3625bfcba242456fbe6f6b0692100d2eea6a2de9ae85b700e03321d09812a7a1368380b7f0c", 0x4a}, {&(0x7f00000020c0)="fcdac1806b49a5f879ce1c9f44348cb72836fb9e070c104162bade7da0078c855a7bf65949525905c75189ef95ba6a9e3722605bcc67a7c09000cdc75458a9eeba218df73e07a42ea6b27d3edc88cdc83e10c08e9008d8f8b838e29295ecdc1b1fefb91436ef3c218557bb354c18f857ebffa85ceadbe922eb07e9677a0cdacee8108e7a509b3a6ddac58141c89642fb030937eac46fd1df86473c8fb9af1c27ed7b83857d73a3bcf86800e54ecf1f9eed20fd49413dbd666b8b5ae8df16518ec743f65077", 0xc5, 0x1}, {&(0x7f00000021c0)="0a8aa5e0e5513048a31e54d448cf1b5d2aa81421c1acc6da4becc92a19d0fd8283d6887f07549a89ba674adffb9137e50f86cba7c2b9f1f3d4cb0185991bf576c274d80f51372f01b8ac08cfdf334b2f59b4c8b8", 0x54, 0x1}, {0x0, 0x0, 0x1}, {&(0x7f00000022c0)="8c5d0aa58ae4ab24fe45a548306c195b2d604620f0b0c2d60ad369b0d5f95d1bd3e137df3e8250ef771ec4e047247a3db7b4c3ade1b6545f2d1f151b5f7f29483f0299cf7dfba7117dfc6634537e4eb6f288e2ed6fdf1fb7a399dfb21548fc1e0bdfa2a84a2718c0e6abeeded2d1df1d6b26ebca1234a49a801655ffe859265a6403a6124fc44d80cc186604d415e68ad67b015adc98854f4d8d90cabac41c08f0706339a95d", 0xa6, 0x8}, {&(0x7f0000002380)}, {&(0x7f00000024c0), 0x0, 0x6}], 0x509b66f1b417291c, &(0x7f0000003640)={[{'mcast_rejoin_count\x00'}, {}, {'lb_tx_method\x00'}, {'bpf_hash_func\x00'}, {'mcast_rejoin_count\x00'}], [{@permit_directio}, {@fsname={'fsname', 0x3d, '\\'}}]}) clock_gettime(0x0, &(0x7f0000003e00)) ioprio_get$pid(0x2, 0x0) llistxattr(&(0x7f0000003f00)='./file0\x00', &(0x7f0000003f40)=""/199, 0xc7) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000004040)) 01:59:31 executing program 6: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) ioctl$sock_SIOCINQ(r0, 0x89e0, 0x0) 01:59:31 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x80000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400028001000470000004f801002000400003000000000000008000295d20d2f153595a4b414c4c4552202046415431362020200e1fbe5b7cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a00", 0xc0}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8fffffff0ffffffffffffff00"/64, 0x40, 0x1e0}, {&(0x7f0000010200)="f8fffffff0ffffffffffffff00"/32, 0x20, 0x400}, {&(0x7f0000010300)="f8fffffff0ffffffffffffff00"/32, 0x20, 0x600}, {&(0x7f0000010400)="f8fffffff0ffffffffffffff00"/32, 0x20, 0x800}, {&(0x7f0000010500)="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", 0x120, 0xa00}, {&(0x7f0000010700)="2e20202020202020202020100080ec70325132510000ec7032510300000000002e2e202020202020202020100080ec70325132510000ec70325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020200080ec70325132510000ec70325104001a040000", 0x80, 0x11800}, {&(0x7f0000010800)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x21800}, {&(0x7f0000010d00)='syzkallers\x00'/32, 0x20, 0x31800}, {&(0x7f0000010e00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x51800}], 0x0, &(0x7f0000010f00)) 01:59:31 executing program 3: syz_emit_ethernet(0x26, &(0x7f0000000000)={@remote, @link_local, @void, {@arp={0x4305, @generic={0x30f, 0x0, 0x6, 0x0, 0x0, @link_local, "", @remote, "4815e7a6"}}}}, 0x0) 01:59:31 executing program 5: openat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x3ff) creat(&(0x7f0000000940)='./file0\x00', 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000001fc0), 0x0, 0x0, 0x7, &(0x7f0000003540)=[{&(0x7f0000002040)="de37fe5096d259ab0117e16bb91f70c862a3f109a4698397a084c0ea8779ecaf3ca7ab5ca3625bfcba242456fbe6f6b0692100d2eea6a2de9ae85b700e03321d09812a7a1368380b7f0c", 0x4a}, {&(0x7f00000020c0)="fcdac1806b49a5f879ce1c9f44348cb72836fb9e070c104162bade7da0078c855a7bf65949525905c75189ef95ba6a9e3722605bcc67a7c09000cdc75458a9eeba218df73e07a42ea6b27d3edc88cdc83e10c08e9008d8f8b838e29295ecdc1b1fefb91436ef3c218557bb354c18f857ebffa85ceadbe922eb07e9677a0cdacee8108e7a509b3a6ddac58141c89642fb030937eac46fd1df86473c8fb9af1c27ed7b83857d73a3bcf86800e54ecf1f9eed20fd49413dbd666b8b5ae8df16518ec743f65077", 0xc5, 0x1}, {&(0x7f00000021c0)="0a8aa5e0e5513048a31e54d448cf1b5d2aa81421c1acc6da4becc92a19d0fd8283d6887f07549a89ba674adffb9137e50f86cba7c2b9f1f3d4cb0185991bf576c274d80f51372f01b8ac08cfdf334b2f59b4c8b8", 0x54, 0x1}, {0x0, 0x0, 0x1}, {&(0x7f00000022c0)="8c5d0aa58ae4ab24fe45a548306c195b2d604620f0b0c2d60ad369b0d5f95d1bd3e137df3e8250ef771ec4e047247a3db7b4c3ade1b6545f2d1f151b5f7f29483f0299cf7dfba7117dfc6634537e4eb6f288e2ed6fdf1fb7a399dfb21548fc1e0bdfa2a84a2718c0e6abeeded2d1df1d6b26ebca1234a49a801655ffe859265a6403a6124fc44d80cc186604d415e68ad67b015adc98854f4d8d90cabac41c08f0706339a95d", 0xa6, 0x8}, {&(0x7f0000002380)}, {&(0x7f00000024c0), 0x0, 0x6}], 0x509b66f1b417291c, &(0x7f0000003640)={[{'mcast_rejoin_count\x00'}, {}, {'lb_tx_method\x00'}, {'bpf_hash_func\x00'}, {'mcast_rejoin_count\x00'}], [{@permit_directio}, {@fsname={'fsname', 0x3d, '\\'}}]}) clock_gettime(0x0, &(0x7f0000003e00)) ioprio_get$pid(0x2, 0x0) llistxattr(&(0x7f0000003f00)='./file0\x00', &(0x7f0000003f40)=""/199, 0xc7) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000004040)) 01:59:31 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) ioctl$sock_SIOCINQ(r0, 0x89e0, 0x0) [ 120.022975] loop0: detected capacity change from 0 to 1304 01:59:31 executing program 4: openat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x3ff) creat(&(0x7f0000000940)='./file0\x00', 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000001fc0), 0x0, 0x0, 0x7, &(0x7f0000003540)=[{&(0x7f0000002040)="de37fe5096d259ab0117e16bb91f70c862a3f109a4698397a084c0ea8779ecaf3ca7ab5ca3625bfcba242456fbe6f6b0692100d2eea6a2de9ae85b700e03321d09812a7a1368380b7f0c", 0x4a}, {&(0x7f00000020c0)="fcdac1806b49a5f879ce1c9f44348cb72836fb9e070c104162bade7da0078c855a7bf65949525905c75189ef95ba6a9e3722605bcc67a7c09000cdc75458a9eeba218df73e07a42ea6b27d3edc88cdc83e10c08e9008d8f8b838e29295ecdc1b1fefb91436ef3c218557bb354c18f857ebffa85ceadbe922eb07e9677a0cdacee8108e7a509b3a6ddac58141c89642fb030937eac46fd1df86473c8fb9af1c27ed7b83857d73a3bcf86800e54ecf1f9eed20fd49413dbd666b8b5ae8df16518ec743f65077", 0xc5, 0x1}, {&(0x7f00000021c0)="0a8aa5e0e5513048a31e54d448cf1b5d2aa81421c1acc6da4becc92a19d0fd8283d6887f07549a89ba674adffb9137e50f86cba7c2b9f1f3d4cb0185991bf576c274d80f51372f01b8ac08cfdf334b2f59b4c8b8", 0x54, 0x1}, {0x0, 0x0, 0x1}, {&(0x7f00000022c0)="8c5d0aa58ae4ab24fe45a548306c195b2d604620f0b0c2d60ad369b0d5f95d1bd3e137df3e8250ef771ec4e047247a3db7b4c3ade1b6545f2d1f151b5f7f29483f0299cf7dfba7117dfc6634537e4eb6f288e2ed6fdf1fb7a399dfb21548fc1e0bdfa2a84a2718c0e6abeeded2d1df1d6b26ebca1234a49a801655ffe859265a6403a6124fc44d80cc186604d415e68ad67b015adc98854f4d8d90cabac41c08f0706339a95d", 0xa6, 0x8}, {&(0x7f0000002380)}, {&(0x7f00000024c0), 0x0, 0x6}], 0x509b66f1b417291c, &(0x7f0000003640)={[{'mcast_rejoin_count\x00'}, {}, {'lb_tx_method\x00'}, {'bpf_hash_func\x00'}, {'mcast_rejoin_count\x00'}], [{@permit_directio}, {@fsname={'fsname', 0x3d, '\\'}}]}) clock_gettime(0x0, &(0x7f0000003e00)) ioprio_get$pid(0x2, 0x0) llistxattr(&(0x7f0000003f00)='./file0\x00', &(0x7f0000003f40)=""/199, 0xc7) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000004040)) 01:59:31 executing program 7: openat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x3ff) creat(&(0x7f0000000940)='./file0\x00', 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000001fc0), 0x0, 0x0, 0x7, &(0x7f0000003540)=[{&(0x7f0000002040)="de37fe5096d259ab0117e16bb91f70c862a3f109a4698397a084c0ea8779ecaf3ca7ab5ca3625bfcba242456fbe6f6b0692100d2eea6a2de9ae85b700e03321d09812a7a1368380b7f0c", 0x4a}, {&(0x7f00000020c0)="fcdac1806b49a5f879ce1c9f44348cb72836fb9e070c104162bade7da0078c855a7bf65949525905c75189ef95ba6a9e3722605bcc67a7c09000cdc75458a9eeba218df73e07a42ea6b27d3edc88cdc83e10c08e9008d8f8b838e29295ecdc1b1fefb91436ef3c218557bb354c18f857ebffa85ceadbe922eb07e9677a0cdacee8108e7a509b3a6ddac58141c89642fb030937eac46fd1df86473c8fb9af1c27ed7b83857d73a3bcf86800e54ecf1f9eed20fd49413dbd666b8b5ae8df16518ec743f65077", 0xc5, 0x1}, {&(0x7f00000021c0)="0a8aa5e0e5513048a31e54d448cf1b5d2aa81421c1acc6da4becc92a19d0fd8283d6887f07549a89ba674adffb9137e50f86cba7c2b9f1f3d4cb0185991bf576c274d80f51372f01b8ac08cfdf334b2f59b4c8b8", 0x54, 0x1}, {0x0, 0x0, 0x1}, {&(0x7f00000022c0)="8c5d0aa58ae4ab24fe45a548306c195b2d604620f0b0c2d60ad369b0d5f95d1bd3e137df3e8250ef771ec4e047247a3db7b4c3ade1b6545f2d1f151b5f7f29483f0299cf7dfba7117dfc6634537e4eb6f288e2ed6fdf1fb7a399dfb21548fc1e0bdfa2a84a2718c0e6abeeded2d1df1d6b26ebca1234a49a801655ffe859265a6403a6124fc44d80cc186604d415e68ad67b015adc98854f4d8d90cabac41c08f0706339a95d", 0xa6, 0x8}, {&(0x7f0000002380)}, {&(0x7f00000024c0), 0x0, 0x6}], 0x509b66f1b417291c, &(0x7f0000003640)={[{'mcast_rejoin_count\x00'}, {}, {'lb_tx_method\x00'}, {'bpf_hash_func\x00'}, {'mcast_rejoin_count\x00'}], [{@permit_directio}, {@fsname={'fsname', 0x3d, '\\'}}]}) clock_gettime(0x0, &(0x7f0000003e00)) ioprio_get$pid(0x2, 0x0) llistxattr(&(0x7f0000003f00)='./file0\x00', &(0x7f0000003f40)=""/199, 0xc7) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000004040)) 01:59:31 executing program 1: openat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x3ff) creat(&(0x7f0000000940)='./file0\x00', 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000001fc0), 0x0, 0x0, 0x7, &(0x7f0000003540)=[{&(0x7f0000002040)="de37fe5096d259ab0117e16bb91f70c862a3f109a4698397a084c0ea8779ecaf3ca7ab5ca3625bfcba242456fbe6f6b0692100d2eea6a2de9ae85b700e03321d09812a7a1368380b7f0c", 0x4a}, {&(0x7f00000020c0)="fcdac1806b49a5f879ce1c9f44348cb72836fb9e070c104162bade7da0078c855a7bf65949525905c75189ef95ba6a9e3722605bcc67a7c09000cdc75458a9eeba218df73e07a42ea6b27d3edc88cdc83e10c08e9008d8f8b838e29295ecdc1b1fefb91436ef3c218557bb354c18f857ebffa85ceadbe922eb07e9677a0cdacee8108e7a509b3a6ddac58141c89642fb030937eac46fd1df86473c8fb9af1c27ed7b83857d73a3bcf86800e54ecf1f9eed20fd49413dbd666b8b5ae8df16518ec743f65077", 0xc5, 0x1}, {&(0x7f00000021c0)="0a8aa5e0e5513048a31e54d448cf1b5d2aa81421c1acc6da4becc92a19d0fd8283d6887f07549a89ba674adffb9137e50f86cba7c2b9f1f3d4cb0185991bf576c274d80f51372f01b8ac08cfdf334b2f59b4c8b8", 0x54, 0x1}, {0x0, 0x0, 0x1}, {&(0x7f00000022c0)="8c5d0aa58ae4ab24fe45a548306c195b2d604620f0b0c2d60ad369b0d5f95d1bd3e137df3e8250ef771ec4e047247a3db7b4c3ade1b6545f2d1f151b5f7f29483f0299cf7dfba7117dfc6634537e4eb6f288e2ed6fdf1fb7a399dfb21548fc1e0bdfa2a84a2718c0e6abeeded2d1df1d6b26ebca1234a49a801655ffe859265a6403a6124fc44d80cc186604d415e68ad67b015adc98854f4d8d90cabac41c08f0706339a95d", 0xa6, 0x8}, {&(0x7f0000002380)}, {&(0x7f00000024c0), 0x0, 0x6}], 0x509b66f1b417291c, &(0x7f0000003640)={[{'mcast_rejoin_count\x00'}, {}, {'lb_tx_method\x00'}, {'bpf_hash_func\x00'}, {'mcast_rejoin_count\x00'}], [{@permit_directio}, {@fsname={'fsname', 0x3d, '\\'}}]}) clock_gettime(0x0, &(0x7f0000003e00)) ioprio_get$pid(0x2, 0x0) llistxattr(&(0x7f0000003f00)='./file0\x00', &(0x7f0000003f40)=""/199, 0xc7) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000004040)) 01:59:31 executing program 6: openat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x3ff) creat(&(0x7f0000000940)='./file0\x00', 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000001fc0), 0x0, 0x0, 0x7, &(0x7f0000003540)=[{&(0x7f0000002040)="de37fe5096d259ab0117e16bb91f70c862a3f109a4698397a084c0ea8779ecaf3ca7ab5ca3625bfcba242456fbe6f6b0692100d2eea6a2de9ae85b700e03321d09812a7a1368380b7f0c", 0x4a}, {&(0x7f00000020c0)="fcdac1806b49a5f879ce1c9f44348cb72836fb9e070c104162bade7da0078c855a7bf65949525905c75189ef95ba6a9e3722605bcc67a7c09000cdc75458a9eeba218df73e07a42ea6b27d3edc88cdc83e10c08e9008d8f8b838e29295ecdc1b1fefb91436ef3c218557bb354c18f857ebffa85ceadbe922eb07e9677a0cdacee8108e7a509b3a6ddac58141c89642fb030937eac46fd1df86473c8fb9af1c27ed7b83857d73a3bcf86800e54ecf1f9eed20fd49413dbd666b8b5ae8df16518ec743f65077", 0xc5, 0x1}, {&(0x7f00000021c0)="0a8aa5e0e5513048a31e54d448cf1b5d2aa81421c1acc6da4becc92a19d0fd8283d6887f07549a89ba674adffb9137e50f86cba7c2b9f1f3d4cb0185991bf576c274d80f51372f01b8ac08cfdf334b2f59b4c8b8", 0x54, 0x1}, {0x0, 0x0, 0x1}, {&(0x7f00000022c0)="8c5d0aa58ae4ab24fe45a548306c195b2d604620f0b0c2d60ad369b0d5f95d1bd3e137df3e8250ef771ec4e047247a3db7b4c3ade1b6545f2d1f151b5f7f29483f0299cf7dfba7117dfc6634537e4eb6f288e2ed6fdf1fb7a399dfb21548fc1e0bdfa2a84a2718c0e6abeeded2d1df1d6b26ebca1234a49a801655ffe859265a6403a6124fc44d80cc186604d415e68ad67b015adc98854f4d8d90cabac41c08f0706339a95d", 0xa6, 0x8}, {&(0x7f0000002380)}, {&(0x7f00000024c0), 0x0, 0x6}], 0x509b66f1b417291c, &(0x7f0000003640)={[{'mcast_rejoin_count\x00'}, {}, {'lb_tx_method\x00'}, {'bpf_hash_func\x00'}, {'mcast_rejoin_count\x00'}], [{@permit_directio}, {@fsname={'fsname', 0x3d, '\\'}}]}) clock_gettime(0x0, &(0x7f0000003e00)) ioprio_get$pid(0x2, 0x0) llistxattr(&(0x7f0000003f00)='./file0\x00', &(0x7f0000003f40)=""/199, 0xc7) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000004040)) 01:59:31 executing program 3: openat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x3ff) creat(&(0x7f0000000940)='./file0\x00', 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000001fc0), 0x0, 0x0, 0x7, &(0x7f0000003540)=[{&(0x7f0000002040)="de37fe5096d259ab0117e16bb91f70c862a3f109a4698397a084c0ea8779ecaf3ca7ab5ca3625bfcba242456fbe6f6b0692100d2eea6a2de9ae85b700e03321d09812a7a1368380b7f0c", 0x4a}, {&(0x7f00000020c0)="fcdac1806b49a5f879ce1c9f44348cb72836fb9e070c104162bade7da0078c855a7bf65949525905c75189ef95ba6a9e3722605bcc67a7c09000cdc75458a9eeba218df73e07a42ea6b27d3edc88cdc83e10c08e9008d8f8b838e29295ecdc1b1fefb91436ef3c218557bb354c18f857ebffa85ceadbe922eb07e9677a0cdacee8108e7a509b3a6ddac58141c89642fb030937eac46fd1df86473c8fb9af1c27ed7b83857d73a3bcf86800e54ecf1f9eed20fd49413dbd666b8b5ae8df16518ec743f65077", 0xc5, 0x1}, {&(0x7f00000021c0)="0a8aa5e0e5513048a31e54d448cf1b5d2aa81421c1acc6da4becc92a19d0fd8283d6887f07549a89ba674adffb9137e50f86cba7c2b9f1f3d4cb0185991bf576c274d80f51372f01b8ac08cfdf334b2f59b4c8b8", 0x54, 0x1}, {0x0, 0x0, 0x1}, {&(0x7f00000022c0)="8c5d0aa58ae4ab24fe45a548306c195b2d604620f0b0c2d60ad369b0d5f95d1bd3e137df3e8250ef771ec4e047247a3db7b4c3ade1b6545f2d1f151b5f7f29483f0299cf7dfba7117dfc6634537e4eb6f288e2ed6fdf1fb7a399dfb21548fc1e0bdfa2a84a2718c0e6abeeded2d1df1d6b26ebca1234a49a801655ffe859265a6403a6124fc44d80cc186604d415e68ad67b015adc98854f4d8d90cabac41c08f0706339a95d", 0xa6, 0x8}, {&(0x7f0000002380)}, {&(0x7f00000024c0), 0x0, 0x6}], 0x509b66f1b417291c, &(0x7f0000003640)={[{'mcast_rejoin_count\x00'}, {}, {'lb_tx_method\x00'}, {'bpf_hash_func\x00'}, {'mcast_rejoin_count\x00'}], [{@permit_directio}, {@fsname={'fsname', 0x3d, '\\'}}]}) clock_gettime(0x0, &(0x7f0000003e00)) ioprio_get$pid(0x2, 0x0) llistxattr(&(0x7f0000003f00)='./file0\x00', &(0x7f0000003f40)=""/199, 0xc7) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000004040)) 01:59:31 executing program 7: openat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x3ff) creat(&(0x7f0000000940)='./file0\x00', 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000001fc0), 0x0, 0x0, 0x7, &(0x7f0000003540)=[{&(0x7f0000002040)="de37fe5096d259ab0117e16bb91f70c862a3f109a4698397a084c0ea8779ecaf3ca7ab5ca3625bfcba242456fbe6f6b0692100d2eea6a2de9ae85b700e03321d09812a7a1368380b7f0c", 0x4a}, {&(0x7f00000020c0)="fcdac1806b49a5f879ce1c9f44348cb72836fb9e070c104162bade7da0078c855a7bf65949525905c75189ef95ba6a9e3722605bcc67a7c09000cdc75458a9eeba218df73e07a42ea6b27d3edc88cdc83e10c08e9008d8f8b838e29295ecdc1b1fefb91436ef3c218557bb354c18f857ebffa85ceadbe922eb07e9677a0cdacee8108e7a509b3a6ddac58141c89642fb030937eac46fd1df86473c8fb9af1c27ed7b83857d73a3bcf86800e54ecf1f9eed20fd49413dbd666b8b5ae8df16518ec743f65077", 0xc5, 0x1}, {&(0x7f00000021c0)="0a8aa5e0e5513048a31e54d448cf1b5d2aa81421c1acc6da4becc92a19d0fd8283d6887f07549a89ba674adffb9137e50f86cba7c2b9f1f3d4cb0185991bf576c274d80f51372f01b8ac08cfdf334b2f59b4c8b8", 0x54, 0x1}, {0x0, 0x0, 0x1}, {&(0x7f00000022c0)="8c5d0aa58ae4ab24fe45a548306c195b2d604620f0b0c2d60ad369b0d5f95d1bd3e137df3e8250ef771ec4e047247a3db7b4c3ade1b6545f2d1f151b5f7f29483f0299cf7dfba7117dfc6634537e4eb6f288e2ed6fdf1fb7a399dfb21548fc1e0bdfa2a84a2718c0e6abeeded2d1df1d6b26ebca1234a49a801655ffe859265a6403a6124fc44d80cc186604d415e68ad67b015adc98854f4d8d90cabac41c08f0706339a95d", 0xa6, 0x8}, {&(0x7f0000002380)}, {&(0x7f00000024c0), 0x0, 0x6}], 0x509b66f1b417291c, &(0x7f0000003640)={[{'mcast_rejoin_count\x00'}, {}, {'lb_tx_method\x00'}, {'bpf_hash_func\x00'}, {'mcast_rejoin_count\x00'}], [{@permit_directio}, {@fsname={'fsname', 0x3d, '\\'}}]}) clock_gettime(0x0, &(0x7f0000003e00)) ioprio_get$pid(0x2, 0x0) llistxattr(&(0x7f0000003f00)='./file0\x00', &(0x7f0000003f40)=""/199, 0xc7) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000004040)) 01:59:31 executing program 1: openat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x3ff) creat(&(0x7f0000000940)='./file0\x00', 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000001fc0), 0x0, 0x0, 0x7, &(0x7f0000003540)=[{&(0x7f0000002040)="de37fe5096d259ab0117e16bb91f70c862a3f109a4698397a084c0ea8779ecaf3ca7ab5ca3625bfcba242456fbe6f6b0692100d2eea6a2de9ae85b700e03321d09812a7a1368380b7f0c", 0x4a}, {&(0x7f00000020c0)="fcdac1806b49a5f879ce1c9f44348cb72836fb9e070c104162bade7da0078c855a7bf65949525905c75189ef95ba6a9e3722605bcc67a7c09000cdc75458a9eeba218df73e07a42ea6b27d3edc88cdc83e10c08e9008d8f8b838e29295ecdc1b1fefb91436ef3c218557bb354c18f857ebffa85ceadbe922eb07e9677a0cdacee8108e7a509b3a6ddac58141c89642fb030937eac46fd1df86473c8fb9af1c27ed7b83857d73a3bcf86800e54ecf1f9eed20fd49413dbd666b8b5ae8df16518ec743f65077", 0xc5, 0x1}, {&(0x7f00000021c0)="0a8aa5e0e5513048a31e54d448cf1b5d2aa81421c1acc6da4becc92a19d0fd8283d6887f07549a89ba674adffb9137e50f86cba7c2b9f1f3d4cb0185991bf576c274d80f51372f01b8ac08cfdf334b2f59b4c8b8", 0x54, 0x1}, {0x0, 0x0, 0x1}, {&(0x7f00000022c0)="8c5d0aa58ae4ab24fe45a548306c195b2d604620f0b0c2d60ad369b0d5f95d1bd3e137df3e8250ef771ec4e047247a3db7b4c3ade1b6545f2d1f151b5f7f29483f0299cf7dfba7117dfc6634537e4eb6f288e2ed6fdf1fb7a399dfb21548fc1e0bdfa2a84a2718c0e6abeeded2d1df1d6b26ebca1234a49a801655ffe859265a6403a6124fc44d80cc186604d415e68ad67b015adc98854f4d8d90cabac41c08f0706339a95d", 0xa6, 0x8}, {&(0x7f0000002380)}, {&(0x7f00000024c0), 0x0, 0x6}], 0x509b66f1b417291c, &(0x7f0000003640)={[{'mcast_rejoin_count\x00'}, {}, {'lb_tx_method\x00'}, {'bpf_hash_func\x00'}, {'mcast_rejoin_count\x00'}], [{@permit_directio}, {@fsname={'fsname', 0x3d, '\\'}}]}) clock_gettime(0x0, &(0x7f0000003e00)) ioprio_get$pid(0x2, 0x0) llistxattr(&(0x7f0000003f00)='./file0\x00', &(0x7f0000003f40)=""/199, 0xc7) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000004040)) 01:59:31 executing program 5: openat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x3ff) creat(&(0x7f0000000940)='./file0\x00', 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000001fc0), 0x0, 0x0, 0x7, &(0x7f0000003540)=[{&(0x7f0000002040)="de37fe5096d259ab0117e16bb91f70c862a3f109a4698397a084c0ea8779ecaf3ca7ab5ca3625bfcba242456fbe6f6b0692100d2eea6a2de9ae85b700e03321d09812a7a1368380b7f0c", 0x4a}, {&(0x7f00000020c0)="fcdac1806b49a5f879ce1c9f44348cb72836fb9e070c104162bade7da0078c855a7bf65949525905c75189ef95ba6a9e3722605bcc67a7c09000cdc75458a9eeba218df73e07a42ea6b27d3edc88cdc83e10c08e9008d8f8b838e29295ecdc1b1fefb91436ef3c218557bb354c18f857ebffa85ceadbe922eb07e9677a0cdacee8108e7a509b3a6ddac58141c89642fb030937eac46fd1df86473c8fb9af1c27ed7b83857d73a3bcf86800e54ecf1f9eed20fd49413dbd666b8b5ae8df16518ec743f65077", 0xc5, 0x1}, {&(0x7f00000021c0)="0a8aa5e0e5513048a31e54d448cf1b5d2aa81421c1acc6da4becc92a19d0fd8283d6887f07549a89ba674adffb9137e50f86cba7c2b9f1f3d4cb0185991bf576c274d80f51372f01b8ac08cfdf334b2f59b4c8b8", 0x54, 0x1}, {0x0, 0x0, 0x1}, {&(0x7f00000022c0)="8c5d0aa58ae4ab24fe45a548306c195b2d604620f0b0c2d60ad369b0d5f95d1bd3e137df3e8250ef771ec4e047247a3db7b4c3ade1b6545f2d1f151b5f7f29483f0299cf7dfba7117dfc6634537e4eb6f288e2ed6fdf1fb7a399dfb21548fc1e0bdfa2a84a2718c0e6abeeded2d1df1d6b26ebca1234a49a801655ffe859265a6403a6124fc44d80cc186604d415e68ad67b015adc98854f4d8d90cabac41c08f0706339a95d", 0xa6, 0x8}, {&(0x7f0000002380)}, {&(0x7f00000024c0), 0x0, 0x6}], 0x509b66f1b417291c, &(0x7f0000003640)={[{'mcast_rejoin_count\x00'}, {}, {'lb_tx_method\x00'}, {'bpf_hash_func\x00'}, {'mcast_rejoin_count\x00'}], [{@permit_directio}, {@fsname={'fsname', 0x3d, '\\'}}]}) clock_gettime(0x0, &(0x7f0000003e00)) ioprio_get$pid(0x2, 0x0) llistxattr(&(0x7f0000003f00)='./file0\x00', &(0x7f0000003f40)=""/199, 0xc7) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000004040)) 01:59:31 executing program 6: openat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x3ff) creat(&(0x7f0000000940)='./file0\x00', 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000001fc0), 0x0, 0x0, 0x7, &(0x7f0000003540)=[{&(0x7f0000002040)="de37fe5096d259ab0117e16bb91f70c862a3f109a4698397a084c0ea8779ecaf3ca7ab5ca3625bfcba242456fbe6f6b0692100d2eea6a2de9ae85b700e03321d09812a7a1368380b7f0c", 0x4a}, {&(0x7f00000020c0)="fcdac1806b49a5f879ce1c9f44348cb72836fb9e070c104162bade7da0078c855a7bf65949525905c75189ef95ba6a9e3722605bcc67a7c09000cdc75458a9eeba218df73e07a42ea6b27d3edc88cdc83e10c08e9008d8f8b838e29295ecdc1b1fefb91436ef3c218557bb354c18f857ebffa85ceadbe922eb07e9677a0cdacee8108e7a509b3a6ddac58141c89642fb030937eac46fd1df86473c8fb9af1c27ed7b83857d73a3bcf86800e54ecf1f9eed20fd49413dbd666b8b5ae8df16518ec743f65077", 0xc5, 0x1}, {&(0x7f00000021c0)="0a8aa5e0e5513048a31e54d448cf1b5d2aa81421c1acc6da4becc92a19d0fd8283d6887f07549a89ba674adffb9137e50f86cba7c2b9f1f3d4cb0185991bf576c274d80f51372f01b8ac08cfdf334b2f59b4c8b8", 0x54, 0x1}, {0x0, 0x0, 0x1}, {&(0x7f00000022c0)="8c5d0aa58ae4ab24fe45a548306c195b2d604620f0b0c2d60ad369b0d5f95d1bd3e137df3e8250ef771ec4e047247a3db7b4c3ade1b6545f2d1f151b5f7f29483f0299cf7dfba7117dfc6634537e4eb6f288e2ed6fdf1fb7a399dfb21548fc1e0bdfa2a84a2718c0e6abeeded2d1df1d6b26ebca1234a49a801655ffe859265a6403a6124fc44d80cc186604d415e68ad67b015adc98854f4d8d90cabac41c08f0706339a95d", 0xa6, 0x8}, {&(0x7f0000002380)}, {&(0x7f00000024c0), 0x0, 0x6}], 0x509b66f1b417291c, &(0x7f0000003640)={[{'mcast_rejoin_count\x00'}, {}, {'lb_tx_method\x00'}, {'bpf_hash_func\x00'}, {'mcast_rejoin_count\x00'}], [{@permit_directio}, {@fsname={'fsname', 0x3d, '\\'}}]}) clock_gettime(0x0, &(0x7f0000003e00)) ioprio_get$pid(0x2, 0x0) llistxattr(&(0x7f0000003f00)='./file0\x00', &(0x7f0000003f40)=""/199, 0xc7) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000004040)) 01:59:31 executing program 1: openat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x3ff) creat(&(0x7f0000000940)='./file0\x00', 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000001fc0), 0x0, 0x0, 0x7, &(0x7f0000003540)=[{&(0x7f0000002040)="de37fe5096d259ab0117e16bb91f70c862a3f109a4698397a084c0ea8779ecaf3ca7ab5ca3625bfcba242456fbe6f6b0692100d2eea6a2de9ae85b700e03321d09812a7a1368380b7f0c", 0x4a}, {&(0x7f00000020c0)="fcdac1806b49a5f879ce1c9f44348cb72836fb9e070c104162bade7da0078c855a7bf65949525905c75189ef95ba6a9e3722605bcc67a7c09000cdc75458a9eeba218df73e07a42ea6b27d3edc88cdc83e10c08e9008d8f8b838e29295ecdc1b1fefb91436ef3c218557bb354c18f857ebffa85ceadbe922eb07e9677a0cdacee8108e7a509b3a6ddac58141c89642fb030937eac46fd1df86473c8fb9af1c27ed7b83857d73a3bcf86800e54ecf1f9eed20fd49413dbd666b8b5ae8df16518ec743f65077", 0xc5, 0x1}, {&(0x7f00000021c0)="0a8aa5e0e5513048a31e54d448cf1b5d2aa81421c1acc6da4becc92a19d0fd8283d6887f07549a89ba674adffb9137e50f86cba7c2b9f1f3d4cb0185991bf576c274d80f51372f01b8ac08cfdf334b2f59b4c8b8", 0x54, 0x1}, {0x0, 0x0, 0x1}, {&(0x7f00000022c0)="8c5d0aa58ae4ab24fe45a548306c195b2d604620f0b0c2d60ad369b0d5f95d1bd3e137df3e8250ef771ec4e047247a3db7b4c3ade1b6545f2d1f151b5f7f29483f0299cf7dfba7117dfc6634537e4eb6f288e2ed6fdf1fb7a399dfb21548fc1e0bdfa2a84a2718c0e6abeeded2d1df1d6b26ebca1234a49a801655ffe859265a6403a6124fc44d80cc186604d415e68ad67b015adc98854f4d8d90cabac41c08f0706339a95d", 0xa6, 0x8}, {&(0x7f0000002380)}, {&(0x7f00000024c0), 0x0, 0x6}], 0x509b66f1b417291c, &(0x7f0000003640)={[{'mcast_rejoin_count\x00'}, {}, {'lb_tx_method\x00'}, {'bpf_hash_func\x00'}, {'mcast_rejoin_count\x00'}], [{@permit_directio}, {@fsname={'fsname', 0x3d, '\\'}}]}) clock_gettime(0x0, &(0x7f0000003e00)) ioprio_get$pid(0x2, 0x0) llistxattr(&(0x7f0000003f00)='./file0\x00', &(0x7f0000003f40)=""/199, 0xc7) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000004040)) 01:59:31 executing program 6: openat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x3ff) creat(&(0x7f0000000940)='./file0\x00', 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000001fc0), 0x0, 0x0, 0x7, &(0x7f0000003540)=[{&(0x7f0000002040)="de37fe5096d259ab0117e16bb91f70c862a3f109a4698397a084c0ea8779ecaf3ca7ab5ca3625bfcba242456fbe6f6b0692100d2eea6a2de9ae85b700e03321d09812a7a1368380b7f0c", 0x4a}, {&(0x7f00000020c0)="fcdac1806b49a5f879ce1c9f44348cb72836fb9e070c104162bade7da0078c855a7bf65949525905c75189ef95ba6a9e3722605bcc67a7c09000cdc75458a9eeba218df73e07a42ea6b27d3edc88cdc83e10c08e9008d8f8b838e29295ecdc1b1fefb91436ef3c218557bb354c18f857ebffa85ceadbe922eb07e9677a0cdacee8108e7a509b3a6ddac58141c89642fb030937eac46fd1df86473c8fb9af1c27ed7b83857d73a3bcf86800e54ecf1f9eed20fd49413dbd666b8b5ae8df16518ec743f65077", 0xc5, 0x1}, {&(0x7f00000021c0)="0a8aa5e0e5513048a31e54d448cf1b5d2aa81421c1acc6da4becc92a19d0fd8283d6887f07549a89ba674adffb9137e50f86cba7c2b9f1f3d4cb0185991bf576c274d80f51372f01b8ac08cfdf334b2f59b4c8b8", 0x54, 0x1}, {0x0, 0x0, 0x1}, {&(0x7f00000022c0)="8c5d0aa58ae4ab24fe45a548306c195b2d604620f0b0c2d60ad369b0d5f95d1bd3e137df3e8250ef771ec4e047247a3db7b4c3ade1b6545f2d1f151b5f7f29483f0299cf7dfba7117dfc6634537e4eb6f288e2ed6fdf1fb7a399dfb21548fc1e0bdfa2a84a2718c0e6abeeded2d1df1d6b26ebca1234a49a801655ffe859265a6403a6124fc44d80cc186604d415e68ad67b015adc98854f4d8d90cabac41c08f0706339a95d", 0xa6, 0x8}, {&(0x7f0000002380)}, {&(0x7f00000024c0), 0x0, 0x6}], 0x509b66f1b417291c, &(0x7f0000003640)={[{'mcast_rejoin_count\x00'}, {}, {'lb_tx_method\x00'}, {'bpf_hash_func\x00'}, {'mcast_rejoin_count\x00'}], [{@permit_directio}, {@fsname={'fsname', 0x3d, '\\'}}]}) clock_gettime(0x0, &(0x7f0000003e00)) ioprio_get$pid(0x2, 0x0) llistxattr(&(0x7f0000003f00)='./file0\x00', &(0x7f0000003f40)=""/199, 0xc7) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000004040)) 01:59:31 executing program 7: openat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x3ff) creat(&(0x7f0000000940)='./file0\x00', 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000001fc0), 0x0, 0x0, 0x7, &(0x7f0000003540)=[{&(0x7f0000002040)="de37fe5096d259ab0117e16bb91f70c862a3f109a4698397a084c0ea8779ecaf3ca7ab5ca3625bfcba242456fbe6f6b0692100d2eea6a2de9ae85b700e03321d09812a7a1368380b7f0c", 0x4a}, {&(0x7f00000020c0)="fcdac1806b49a5f879ce1c9f44348cb72836fb9e070c104162bade7da0078c855a7bf65949525905c75189ef95ba6a9e3722605bcc67a7c09000cdc75458a9eeba218df73e07a42ea6b27d3edc88cdc83e10c08e9008d8f8b838e29295ecdc1b1fefb91436ef3c218557bb354c18f857ebffa85ceadbe922eb07e9677a0cdacee8108e7a509b3a6ddac58141c89642fb030937eac46fd1df86473c8fb9af1c27ed7b83857d73a3bcf86800e54ecf1f9eed20fd49413dbd666b8b5ae8df16518ec743f65077", 0xc5, 0x1}, {&(0x7f00000021c0)="0a8aa5e0e5513048a31e54d448cf1b5d2aa81421c1acc6da4becc92a19d0fd8283d6887f07549a89ba674adffb9137e50f86cba7c2b9f1f3d4cb0185991bf576c274d80f51372f01b8ac08cfdf334b2f59b4c8b8", 0x54, 0x1}, {0x0, 0x0, 0x1}, {&(0x7f00000022c0)="8c5d0aa58ae4ab24fe45a548306c195b2d604620f0b0c2d60ad369b0d5f95d1bd3e137df3e8250ef771ec4e047247a3db7b4c3ade1b6545f2d1f151b5f7f29483f0299cf7dfba7117dfc6634537e4eb6f288e2ed6fdf1fb7a399dfb21548fc1e0bdfa2a84a2718c0e6abeeded2d1df1d6b26ebca1234a49a801655ffe859265a6403a6124fc44d80cc186604d415e68ad67b015adc98854f4d8d90cabac41c08f0706339a95d", 0xa6, 0x8}, {&(0x7f0000002380)}, {&(0x7f00000024c0), 0x0, 0x6}], 0x509b66f1b417291c, &(0x7f0000003640)={[{'mcast_rejoin_count\x00'}, {}, {'lb_tx_method\x00'}, {'bpf_hash_func\x00'}, {'mcast_rejoin_count\x00'}], [{@permit_directio}, {@fsname={'fsname', 0x3d, '\\'}}]}) clock_gettime(0x0, &(0x7f0000003e00)) ioprio_get$pid(0x2, 0x0) llistxattr(&(0x7f0000003f00)='./file0\x00', &(0x7f0000003f40)=""/199, 0xc7) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000004040)) 01:59:31 executing program 3: openat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x3ff) creat(&(0x7f0000000940)='./file0\x00', 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000001fc0), 0x0, 0x0, 0x7, &(0x7f0000003540)=[{&(0x7f0000002040)="de37fe5096d259ab0117e16bb91f70c862a3f109a4698397a084c0ea8779ecaf3ca7ab5ca3625bfcba242456fbe6f6b0692100d2eea6a2de9ae85b700e03321d09812a7a1368380b7f0c", 0x4a}, {&(0x7f00000020c0)="fcdac1806b49a5f879ce1c9f44348cb72836fb9e070c104162bade7da0078c855a7bf65949525905c75189ef95ba6a9e3722605bcc67a7c09000cdc75458a9eeba218df73e07a42ea6b27d3edc88cdc83e10c08e9008d8f8b838e29295ecdc1b1fefb91436ef3c218557bb354c18f857ebffa85ceadbe922eb07e9677a0cdacee8108e7a509b3a6ddac58141c89642fb030937eac46fd1df86473c8fb9af1c27ed7b83857d73a3bcf86800e54ecf1f9eed20fd49413dbd666b8b5ae8df16518ec743f65077", 0xc5, 0x1}, {&(0x7f00000021c0)="0a8aa5e0e5513048a31e54d448cf1b5d2aa81421c1acc6da4becc92a19d0fd8283d6887f07549a89ba674adffb9137e50f86cba7c2b9f1f3d4cb0185991bf576c274d80f51372f01b8ac08cfdf334b2f59b4c8b8", 0x54, 0x1}, {0x0, 0x0, 0x1}, {&(0x7f00000022c0)="8c5d0aa58ae4ab24fe45a548306c195b2d604620f0b0c2d60ad369b0d5f95d1bd3e137df3e8250ef771ec4e047247a3db7b4c3ade1b6545f2d1f151b5f7f29483f0299cf7dfba7117dfc6634537e4eb6f288e2ed6fdf1fb7a399dfb21548fc1e0bdfa2a84a2718c0e6abeeded2d1df1d6b26ebca1234a49a801655ffe859265a6403a6124fc44d80cc186604d415e68ad67b015adc98854f4d8d90cabac41c08f0706339a95d", 0xa6, 0x8}, {&(0x7f0000002380)}, {&(0x7f00000024c0), 0x0, 0x6}], 0x509b66f1b417291c, &(0x7f0000003640)={[{'mcast_rejoin_count\x00'}, {}, {'lb_tx_method\x00'}, {'bpf_hash_func\x00'}, {'mcast_rejoin_count\x00'}], [{@permit_directio}, {@fsname={'fsname', 0x3d, '\\'}}]}) clock_gettime(0x0, &(0x7f0000003e00)) ioprio_get$pid(0x2, 0x0) llistxattr(&(0x7f0000003f00)='./file0\x00', &(0x7f0000003f40)=""/199, 0xc7) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000004040)) 01:59:31 executing program 2: prlimit64(0x0, 0x7, &(0x7f0000000080)={0x4, 0x6}, 0x0) r0 = fsopen(&(0x7f0000000180)='ramfs\x00', 0x0) dup(r0) 01:59:31 executing program 3: openat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x3ff) creat(&(0x7f0000000940)='./file0\x00', 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000001fc0), 0x0, 0x0, 0x7, &(0x7f0000003540)=[{&(0x7f0000002040)="de37fe5096d259ab0117e16bb91f70c862a3f109a4698397a084c0ea8779ecaf3ca7ab5ca3625bfcba242456fbe6f6b0692100d2eea6a2de9ae85b700e03321d09812a7a1368380b7f0c", 0x4a}, {&(0x7f00000020c0)="fcdac1806b49a5f879ce1c9f44348cb72836fb9e070c104162bade7da0078c855a7bf65949525905c75189ef95ba6a9e3722605bcc67a7c09000cdc75458a9eeba218df73e07a42ea6b27d3edc88cdc83e10c08e9008d8f8b838e29295ecdc1b1fefb91436ef3c218557bb354c18f857ebffa85ceadbe922eb07e9677a0cdacee8108e7a509b3a6ddac58141c89642fb030937eac46fd1df86473c8fb9af1c27ed7b83857d73a3bcf86800e54ecf1f9eed20fd49413dbd666b8b5ae8df16518ec743f65077", 0xc5, 0x1}, {&(0x7f00000021c0)="0a8aa5e0e5513048a31e54d448cf1b5d2aa81421c1acc6da4becc92a19d0fd8283d6887f07549a89ba674adffb9137e50f86cba7c2b9f1f3d4cb0185991bf576c274d80f51372f01b8ac08cfdf334b2f59b4c8b8", 0x54, 0x1}, {0x0, 0x0, 0x1}, {&(0x7f00000022c0)="8c5d0aa58ae4ab24fe45a548306c195b2d604620f0b0c2d60ad369b0d5f95d1bd3e137df3e8250ef771ec4e047247a3db7b4c3ade1b6545f2d1f151b5f7f29483f0299cf7dfba7117dfc6634537e4eb6f288e2ed6fdf1fb7a399dfb21548fc1e0bdfa2a84a2718c0e6abeeded2d1df1d6b26ebca1234a49a801655ffe859265a6403a6124fc44d80cc186604d415e68ad67b015adc98854f4d8d90cabac41c08f0706339a95d", 0xa6, 0x8}, {&(0x7f0000002380)}, {&(0x7f00000024c0), 0x0, 0x6}], 0x509b66f1b417291c, &(0x7f0000003640)={[{'mcast_rejoin_count\x00'}, {}, {'lb_tx_method\x00'}, {'bpf_hash_func\x00'}, {'mcast_rejoin_count\x00'}], [{@permit_directio}, {@fsname={'fsname', 0x3d, '\\'}}]}) clock_gettime(0x0, &(0x7f0000003e00)) ioprio_get$pid(0x2, 0x0) llistxattr(&(0x7f0000003f00)='./file0\x00', &(0x7f0000003f40)=""/199, 0xc7) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000004040)) 01:59:31 executing program 2: prlimit64(0x0, 0x7, &(0x7f0000000080)={0x4, 0x6}, 0x0) r0 = fsopen(&(0x7f0000000180)='ramfs\x00', 0x0) dup(r0) 01:59:31 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f00000001c0)=@sg0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='binfmt_misc\x00', 0x0, 0x0) 01:59:31 executing program 5: prlimit64(0x0, 0x7, &(0x7f0000000080)={0x4, 0x6}, 0x0) r0 = fsopen(&(0x7f0000000180)='ramfs\x00', 0x0) dup(r0) 01:59:31 executing program 2: prlimit64(0x0, 0x7, &(0x7f0000000080)={0x4, 0x6}, 0x0) r0 = fsopen(&(0x7f0000000180)='ramfs\x00', 0x0) dup(r0) 01:59:31 executing program 5: prlimit64(0x0, 0x7, &(0x7f0000000080)={0x4, 0x6}, 0x0) r0 = fsopen(&(0x7f0000000180)='ramfs\x0 VM DIAGNOSIS: 01:59:27 Registers: info registers vcpu 0 RAX=0000000000000072 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff823bb0f1 RDI=ffffffff8765a9a0 RBP=ffffffff8765a960 RSP=ffff88803f467690 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000072 R11=0000000000000001 R12=0000000000000072 R13=ffffffff8765a960 R14=0000000000000010 R15=ffffffff823bb0e0 RIP=ffffffff823bb149 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f8611016700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f6393d2c010 CR3=000000000f51e000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f8613b877c0 00007f8613b877c8 YMM02=0000000000000000 0000000000000000 00007f8613b877e0 00007f8613b877c0 YMM03=0000000000000000 0000000000000000 00007f8613b877c8 00007f8613b877c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000080000002 RBX=ffff88800fb8b580 RCX=0000000080000002 RDX=1ffff11001f180c0 RSI=ffffffff811da370 RDI=ffff88800f8c0600 RBP=dffffc0000000000 RSP=ffff88800fd8fd88 R8 =0000000000000000 R9 =ffff88800f8c0607 R10=ffffed1001f180c0 R11=0000000000000001 R12=ffffc9000f7a9ff9 R13=ffff88800fb8b580 R14=0000000000000000 R15=0000000000000092 RIP=ffffffff81460c3d RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000555555d48c58 CR3=000000000d9a6000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 6576652d7372656b 726f772d6c6c696b YMM02=0000000000000000 0000000000000000 0000000000000000 00000000000000ff YMM03=0000000000000000 0000000000000000 696e656420737365 636341002f737973 YMM04=0000000000000000 0000000000000000 0000559082b06a40 0000559082b36270 YMM05=0000000000000000 0000000000000000 0000000800000005 0000559082b69b30 YMM06=0000000000000000 0000000000000000 0000000000000000 ffffffff00000009 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 2064616572206f74 2064656c69614600 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000