Warning: Permanently added '[localhost]:52753' (ECDSA) to the list of known hosts. 2022/09/13 17:36:26 fuzzer started 2022/09/13 17:36:26 dialing manager at localhost:36597 syzkaller login: [ 36.605146] cgroup: Unknown subsys name 'net' [ 36.721426] cgroup: Unknown subsys name 'rlimit' 2022/09/13 17:36:40 syscalls: 2215 2022/09/13 17:36:40 code coverage: enabled 2022/09/13 17:36:40 comparison tracing: enabled 2022/09/13 17:36:40 extra coverage: enabled 2022/09/13 17:36:40 setuid sandbox: enabled 2022/09/13 17:36:40 namespace sandbox: enabled 2022/09/13 17:36:40 Android sandbox: enabled 2022/09/13 17:36:40 fault injection: enabled 2022/09/13 17:36:40 leak checking: enabled 2022/09/13 17:36:40 net packet injection: enabled 2022/09/13 17:36:40 net device setup: enabled 2022/09/13 17:36:40 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/13 17:36:40 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/13 17:36:40 USB emulation: enabled 2022/09/13 17:36:40 hci packet injection: enabled 2022/09/13 17:36:40 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220913) 2022/09/13 17:36:40 802.15.4 emulation: enabled 2022/09/13 17:36:40 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/13 17:36:41 fetching corpus: 50, signal 30043/33605 (executing program) 2022/09/13 17:36:41 fetching corpus: 100, signal 42640/47689 (executing program) 2022/09/13 17:36:41 fetching corpus: 150, signal 52910/59360 (executing program) 2022/09/13 17:36:41 fetching corpus: 200, signal 60880/68664 (executing program) 2022/09/13 17:36:41 fetching corpus: 250, signal 68909/77923 (executing program) 2022/09/13 17:36:41 fetching corpus: 300, signal 77039/87184 (executing program) 2022/09/13 17:36:42 fetching corpus: 350, signal 81302/92686 (executing program) 2022/09/13 17:36:42 fetching corpus: 400, signal 86323/98750 (executing program) 2022/09/13 17:36:42 fetching corpus: 450, signal 94498/107715 (executing program) 2022/09/13 17:36:42 fetching corpus: 500, signal 97702/111952 (executing program) 2022/09/13 17:36:42 fetching corpus: 550, signal 102068/117253 (executing program) 2022/09/13 17:36:42 fetching corpus: 600, signal 105123/121220 (executing program) 2022/09/13 17:36:43 fetching corpus: 650, signal 110020/126812 (executing program) 2022/09/13 17:36:43 fetching corpus: 700, signal 113574/131196 (executing program) 2022/09/13 17:36:43 fetching corpus: 750, signal 115547/134163 (executing program) 2022/09/13 17:36:43 fetching corpus: 799, signal 117634/137154 (executing program) 2022/09/13 17:36:43 fetching corpus: 849, signal 120898/141122 (executing program) 2022/09/13 17:36:43 fetching corpus: 899, signal 124690/145501 (executing program) 2022/09/13 17:36:43 fetching corpus: 949, signal 127577/149057 (executing program) 2022/09/13 17:36:43 fetching corpus: 998, signal 129058/151438 (executing program) 2022/09/13 17:36:44 fetching corpus: 1048, signal 130666/153826 (executing program) 2022/09/13 17:36:44 fetching corpus: 1098, signal 133187/156973 (executing program) 2022/09/13 17:36:44 fetching corpus: 1148, signal 134713/159272 (executing program) 2022/09/13 17:36:44 fetching corpus: 1198, signal 135901/161253 (executing program) 2022/09/13 17:36:44 fetching corpus: 1248, signal 138164/164140 (executing program) 2022/09/13 17:36:44 fetching corpus: 1298, signal 139788/166421 (executing program) 2022/09/13 17:36:44 fetching corpus: 1348, signal 141321/168620 (executing program) 2022/09/13 17:36:45 fetching corpus: 1398, signal 143505/171316 (executing program) 2022/09/13 17:36:46 fetching corpus: 1448, signal 145738/174019 (executing program) 2022/09/13 17:36:46 fetching corpus: 1498, signal 147616/176432 (executing program) 2022/09/13 17:36:46 fetching corpus: 1548, signal 150025/179194 (executing program) 2022/09/13 17:36:46 fetching corpus: 1598, signal 151508/181230 (executing program) 2022/09/13 17:36:46 fetching corpus: 1647, signal 153139/183307 (executing program) 2022/09/13 17:36:46 fetching corpus: 1694, signal 155162/185696 (executing program) 2022/09/13 17:36:46 fetching corpus: 1744, signal 156600/187583 (executing program) 2022/09/13 17:36:47 fetching corpus: 1791, signal 158188/189624 (executing program) 2022/09/13 17:36:47 fetching corpus: 1841, signal 160029/191823 (executing program) 2022/09/13 17:36:47 fetching corpus: 1890, signal 162152/194201 (executing program) 2022/09/13 17:36:47 fetching corpus: 1940, signal 164243/196486 (executing program) 2022/09/13 17:36:47 fetching corpus: 1990, signal 165961/198498 (executing program) 2022/09/13 17:36:47 fetching corpus: 2036, signal 167108/200065 (executing program) 2022/09/13 17:36:47 fetching corpus: 2086, signal 168577/201920 (executing program) 2022/09/13 17:36:48 fetching corpus: 2136, signal 169704/203466 (executing program) 2022/09/13 17:36:48 fetching corpus: 2186, signal 170724/204952 (executing program) 2022/09/13 17:36:48 fetching corpus: 2235, signal 171926/206548 (executing program) 2022/09/13 17:36:48 fetching corpus: 2282, signal 172949/208015 (executing program) 2022/09/13 17:36:48 fetching corpus: 2331, signal 174518/209742 (executing program) 2022/09/13 17:36:48 fetching corpus: 2381, signal 175963/211435 (executing program) 2022/09/13 17:36:48 fetching corpus: 2429, signal 176523/212545 (executing program) 2022/09/13 17:36:49 fetching corpus: 2478, signal 177976/214187 (executing program) 2022/09/13 17:36:49 fetching corpus: 2526, signal 179575/215876 (executing program) 2022/09/13 17:36:49 fetching corpus: 2576, signal 181802/217890 (executing program) 2022/09/13 17:36:49 fetching corpus: 2626, signal 182916/219194 (executing program) 2022/09/13 17:36:49 fetching corpus: 2675, signal 184380/220706 (executing program) 2022/09/13 17:36:49 fetching corpus: 2722, signal 185287/221870 (executing program) 2022/09/13 17:36:49 fetching corpus: 2770, signal 186153/223104 (executing program) 2022/09/13 17:36:49 fetching corpus: 2820, signal 187132/224368 (executing program) 2022/09/13 17:36:50 fetching corpus: 2870, signal 188019/225566 (executing program) 2022/09/13 17:36:50 fetching corpus: 2917, signal 188884/226698 (executing program) 2022/09/13 17:36:50 fetching corpus: 2967, signal 189891/227906 (executing program) 2022/09/13 17:36:50 fetching corpus: 3015, signal 191415/229342 (executing program) 2022/09/13 17:36:50 fetching corpus: 3064, signal 192197/230333 (executing program) 2022/09/13 17:36:50 fetching corpus: 3113, signal 192989/231359 (executing program) 2022/09/13 17:36:50 fetching corpus: 3163, signal 194091/232503 (executing program) 2022/09/13 17:36:51 fetching corpus: 3211, signal 194859/233514 (executing program) 2022/09/13 17:36:51 fetching corpus: 3261, signal 195578/234460 (executing program) 2022/09/13 17:36:51 fetching corpus: 3311, signal 196712/235618 (executing program) 2022/09/13 17:36:51 fetching corpus: 3360, signal 198058/236838 (executing program) 2022/09/13 17:36:51 fetching corpus: 3409, signal 198801/237735 (executing program) 2022/09/13 17:36:51 fetching corpus: 3459, signal 199309/238565 (executing program) 2022/09/13 17:36:51 fetching corpus: 3507, signal 200092/239466 (executing program) 2022/09/13 17:36:52 fetching corpus: 3556, signal 200729/240343 (executing program) 2022/09/13 17:36:52 fetching corpus: 3606, signal 201486/241222 (executing program) 2022/09/13 17:36:52 fetching corpus: 3655, signal 202314/242177 (executing program) 2022/09/13 17:36:52 fetching corpus: 3705, signal 203215/243123 (executing program) 2022/09/13 17:36:52 fetching corpus: 3754, signal 204344/244207 (executing program) 2022/09/13 17:36:52 fetching corpus: 3804, signal 205444/245201 (executing program) 2022/09/13 17:36:52 fetching corpus: 3854, signal 206187/246082 (executing program) 2022/09/13 17:36:52 fetching corpus: 3901, signal 207130/246960 (executing program) 2022/09/13 17:36:52 fetching corpus: 3950, signal 207594/247654 (executing program) 2022/09/13 17:36:53 fetching corpus: 4000, signal 208656/248611 (executing program) 2022/09/13 17:36:53 fetching corpus: 4049, signal 209540/249399 (executing program) 2022/09/13 17:36:53 fetching corpus: 4099, signal 210438/250223 (executing program) 2022/09/13 17:36:53 fetching corpus: 4149, signal 211500/251078 (executing program) 2022/09/13 17:36:53 fetching corpus: 4199, signal 212272/251808 (executing program) 2022/09/13 17:36:53 fetching corpus: 4247, signal 213124/252698 (executing program) 2022/09/13 17:36:53 fetching corpus: 4297, signal 213744/253367 (executing program) 2022/09/13 17:36:54 fetching corpus: 4347, signal 214936/254277 (executing program) 2022/09/13 17:36:54 fetching corpus: 4396, signal 215685/254956 (executing program) 2022/09/13 17:36:54 fetching corpus: 4446, signal 216288/255576 (executing program) 2022/09/13 17:36:54 fetching corpus: 4496, signal 216932/256210 (executing program) 2022/09/13 17:36:54 fetching corpus: 4546, signal 217577/256856 (executing program) 2022/09/13 17:36:54 fetching corpus: 4595, signal 218382/257538 (executing program) 2022/09/13 17:36:54 fetching corpus: 4645, signal 219007/258146 (executing program) 2022/09/13 17:36:55 fetching corpus: 4695, signal 219703/258795 (executing program) 2022/09/13 17:36:55 fetching corpus: 4745, signal 220684/259515 (executing program) 2022/09/13 17:36:55 fetching corpus: 4795, signal 222067/260423 (executing program) 2022/09/13 17:36:55 fetching corpus: 4845, signal 223169/261110 (executing program) 2022/09/13 17:36:55 fetching corpus: 4895, signal 224076/261754 (executing program) 2022/09/13 17:36:55 fetching corpus: 4945, signal 224793/262345 (executing program) 2022/09/13 17:36:56 fetching corpus: 4995, signal 225337/262871 (executing program) 2022/09/13 17:36:56 fetching corpus: 5045, signal 226350/263456 (executing program) 2022/09/13 17:36:56 fetching corpus: 5095, signal 227076/264004 (executing program) 2022/09/13 17:36:56 fetching corpus: 5145, signal 227535/264453 (executing program) 2022/09/13 17:36:56 fetching corpus: 5195, signal 228201/264949 (executing program) 2022/09/13 17:36:56 fetching corpus: 5245, signal 228963/265524 (executing program) 2022/09/13 17:36:56 fetching corpus: 5295, signal 229916/266130 (executing program) 2022/09/13 17:36:56 fetching corpus: 5345, signal 230756/266629 (executing program) 2022/09/13 17:36:57 fetching corpus: 5395, signal 231378/267086 (executing program) 2022/09/13 17:36:57 fetching corpus: 5445, signal 231898/267510 (executing program) 2022/09/13 17:36:57 fetching corpus: 5494, signal 232473/267917 (executing program) 2022/09/13 17:36:57 fetching corpus: 5544, signal 233050/268323 (executing program) 2022/09/13 17:36:57 fetching corpus: 5594, signal 233877/268784 (executing program) 2022/09/13 17:36:57 fetching corpus: 5643, signal 235115/269305 (executing program) 2022/09/13 17:36:58 fetching corpus: 5692, signal 236067/269756 (executing program) 2022/09/13 17:36:58 fetching corpus: 5742, signal 237064/270167 (executing program) 2022/09/13 17:36:58 fetching corpus: 5792, signal 237608/270536 (executing program) 2022/09/13 17:36:58 fetching corpus: 5842, signal 238245/270893 (executing program) 2022/09/13 17:36:58 fetching corpus: 5892, signal 238771/271224 (executing program) 2022/09/13 17:36:58 fetching corpus: 5942, signal 239402/271562 (executing program) 2022/09/13 17:36:58 fetching corpus: 5992, signal 240039/271907 (executing program) 2022/09/13 17:36:58 fetching corpus: 6042, signal 241037/272286 (executing program) 2022/09/13 17:36:59 fetching corpus: 6092, signal 241560/272588 (executing program) 2022/09/13 17:36:59 fetching corpus: 6142, signal 241871/272865 (executing program) 2022/09/13 17:36:59 fetching corpus: 6192, signal 242989/273178 (executing program) 2022/09/13 17:36:59 fetching corpus: 6242, signal 243618/273485 (executing program) 2022/09/13 17:36:59 fetching corpus: 6292, signal 243995/273762 (executing program) 2022/09/13 17:36:59 fetching corpus: 6341, signal 244575/274009 (executing program) 2022/09/13 17:36:59 fetching corpus: 6391, signal 245142/274249 (executing program) 2022/09/13 17:37:00 fetching corpus: 6441, signal 245895/274520 (executing program) 2022/09/13 17:37:00 fetching corpus: 6491, signal 246810/274752 (executing program) 2022/09/13 17:37:00 fetching corpus: 6541, signal 247362/274982 (executing program) 2022/09/13 17:37:00 fetching corpus: 6591, signal 247918/275180 (executing program) 2022/09/13 17:37:00 fetching corpus: 6641, signal 248227/275227 (executing program) 2022/09/13 17:37:00 fetching corpus: 6691, signal 248502/275235 (executing program) 2022/09/13 17:37:00 fetching corpus: 6741, signal 249233/275238 (executing program) 2022/09/13 17:37:01 fetching corpus: 6791, signal 249857/275244 (executing program) 2022/09/13 17:37:01 fetching corpus: 6841, signal 250440/275246 (executing program) 2022/09/13 17:37:01 fetching corpus: 6890, signal 251024/275249 (executing program) 2022/09/13 17:37:01 fetching corpus: 6940, signal 251600/275279 (executing program) 2022/09/13 17:37:01 fetching corpus: 6990, signal 252052/275285 (executing program) 2022/09/13 17:37:01 fetching corpus: 7040, signal 252574/275287 (executing program) 2022/09/13 17:37:02 fetching corpus: 7090, signal 253217/275296 (executing program) 2022/09/13 17:37:02 fetching corpus: 7140, signal 253536/275303 (executing program) 2022/09/13 17:37:02 fetching corpus: 7189, signal 254468/275312 (executing program) 2022/09/13 17:37:02 fetching corpus: 7239, signal 254790/275319 (executing program) 2022/09/13 17:37:02 fetching corpus: 7289, signal 255301/275325 (executing program) 2022/09/13 17:37:02 fetching corpus: 7338, signal 256000/275329 (executing program) 2022/09/13 17:37:02 fetching corpus: 7388, signal 256382/275329 (executing program) 2022/09/13 17:37:03 fetching corpus: 7438, signal 257102/275334 (executing program) 2022/09/13 17:37:03 fetching corpus: 7488, signal 257792/275337 (executing program) 2022/09/13 17:37:03 fetching corpus: 7538, signal 258262/275339 (executing program) 2022/09/13 17:37:03 fetching corpus: 7588, signal 258673/275341 (executing program) 2022/09/13 17:37:03 fetching corpus: 7638, signal 259160/275359 (executing program) 2022/09/13 17:37:03 fetching corpus: 7688, signal 259799/275402 (executing program) 2022/09/13 17:37:03 fetching corpus: 7738, signal 260483/275402 (executing program) 2022/09/13 17:37:04 fetching corpus: 7788, signal 260806/275431 (executing program) 2022/09/13 17:37:04 fetching corpus: 7838, signal 261190/275436 (executing program) 2022/09/13 17:37:04 fetching corpus: 7888, signal 261696/275437 (executing program) 2022/09/13 17:37:04 fetching corpus: 7938, signal 262048/275465 (executing program) 2022/09/13 17:37:04 fetching corpus: 7988, signal 262519/275468 (executing program) 2022/09/13 17:37:04 fetching corpus: 8037, signal 262999/275469 (executing program) 2022/09/13 17:37:04 fetching corpus: 8087, signal 263639/275487 (executing program) 2022/09/13 17:37:04 fetching corpus: 8137, signal 264040/275494 (executing program) 2022/09/13 17:37:05 fetching corpus: 8187, signal 264645/275502 (executing program) 2022/09/13 17:37:05 fetching corpus: 8236, signal 265376/275502 (executing program) 2022/09/13 17:37:05 fetching corpus: 8286, signal 265737/275503 (executing program) 2022/09/13 17:37:05 fetching corpus: 8336, signal 266111/275523 (executing program) 2022/09/13 17:37:05 fetching corpus: 8347, signal 266194/275553 (executing program) 2022/09/13 17:37:05 fetching corpus: 8347, signal 266194/275553 (executing program) 2022/09/13 17:37:08 starting 8 fuzzer processes 17:37:08 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000a40)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@sec_ctx={0xc, 0x8, {0x8}}]}, 0xcc}}, 0x0) 17:37:08 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @random="671700", @void, {@ipv4={0x800, @igmp={{0x8, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @dev, @remote}, {0x0, 0x0, 0x0, @empty}}}}}, 0x0) 17:37:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x14, r1, 0x1, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 17:37:08 executing program 3: iopl(0x1) 17:37:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x3, 0x0, 0x0) 17:37:08 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, '\x00', 0x2}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f00000005c0)=""/4096, &(0x7f0000000300)=0x1000) 17:37:08 executing program 6: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r1, 0x87d27e71721737b5, 0x0, 0x0, {{0x32}, {@void, @val={0x8}, @val={0x2f}}}}, 0x28}}, 0x0) [ 78.157050] audit: type=1400 audit(1663090628.469:6): avc: denied { execmem } for pid=284 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 17:37:08 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f0000000480)=""/251) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545ea8ef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ca9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x1, 0x80, 0xf7, 0x30, 0x3, 0x8, 0x0, 0x7a8c, 0x820, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x582e}, 0x50, 0x5, 0x3, 0x5, 0x9, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/136}, 0x90, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(0x0, &(0x7f0000000580)={0x1, "299c785aee3c066b23989475db52bbf77b34e71114bcfae9f6aeabe52abac8f4db8229be63d6874bb3f01332e55c8d2fd817661c46eec77e2a561805e0"}, 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) [ 79.387135] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 79.388112] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 79.388936] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 79.389883] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 79.390392] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 79.391048] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 79.391684] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 79.392216] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 79.392872] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 79.396750] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 79.397424] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 79.398250] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 79.399549] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 79.400350] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 79.401152] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 79.402008] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 79.402782] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 79.403531] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 79.408098] Bluetooth: hci0: HCI_REQ-0x0c1a [ 79.410338] Bluetooth: hci1: HCI_REQ-0x0c1a [ 79.438077] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 79.438522] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 79.444265] Bluetooth: hci2: HCI_REQ-0x0c1a [ 79.444608] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 79.446375] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 79.450727] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 79.453350] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 79.455799] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 79.467539] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 79.469291] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 79.470370] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 79.472763] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 79.473899] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 79.474949] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 79.476099] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 79.478079] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 79.496235] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 79.497856] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 79.499076] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 79.500292] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 79.502485] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 79.504137] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 79.511556] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 79.513282] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 79.514300] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 79.524913] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 79.526227] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 79.527388] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 79.535142] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 79.536786] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 79.540536] Bluetooth: hci7: HCI_REQ-0x0c1a [ 79.553436] Bluetooth: hci3: HCI_REQ-0x0c1a [ 79.553488] Bluetooth: hci4: HCI_REQ-0x0c1a [ 79.567783] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 79.573232] Bluetooth: hci5: HCI_REQ-0x0c1a [ 79.604642] Bluetooth: hci6: HCI_REQ-0x0c1a [ 81.463199] Bluetooth: hci2: command 0x0409 tx timeout [ 81.464370] Bluetooth: hci1: command 0x0409 tx timeout [ 81.465144] Bluetooth: hci0: command 0x0409 tx timeout [ 81.590639] Bluetooth: hci4: command 0x0409 tx timeout [ 81.591738] Bluetooth: hci3: command 0x0409 tx timeout [ 81.592424] Bluetooth: hci7: command 0x0409 tx timeout [ 81.654640] Bluetooth: hci6: command 0x0409 tx timeout [ 81.654729] Bluetooth: hci5: command 0x0409 tx timeout [ 83.510642] Bluetooth: hci0: command 0x041b tx timeout [ 83.511375] Bluetooth: hci1: command 0x041b tx timeout [ 83.512626] Bluetooth: hci2: command 0x041b tx timeout [ 83.639666] Bluetooth: hci7: command 0x041b tx timeout [ 83.640155] Bluetooth: hci3: command 0x041b tx timeout [ 83.640632] Bluetooth: hci4: command 0x041b tx timeout [ 83.702621] Bluetooth: hci5: command 0x041b tx timeout [ 83.703534] Bluetooth: hci6: command 0x041b tx timeout [ 85.559621] Bluetooth: hci2: command 0x040f tx timeout [ 85.560140] Bluetooth: hci1: command 0x040f tx timeout [ 85.561144] Bluetooth: hci0: command 0x040f tx timeout [ 85.686630] Bluetooth: hci4: command 0x040f tx timeout [ 85.687123] Bluetooth: hci3: command 0x040f tx timeout [ 85.687554] Bluetooth: hci7: command 0x040f tx timeout [ 85.750616] Bluetooth: hci6: command 0x040f tx timeout [ 85.751550] Bluetooth: hci5: command 0x040f tx timeout [ 87.607706] Bluetooth: hci0: command 0x0419 tx timeout [ 87.608525] Bluetooth: hci1: command 0x0419 tx timeout [ 87.609316] Bluetooth: hci2: command 0x0419 tx timeout [ 87.735668] Bluetooth: hci7: command 0x0419 tx timeout [ 87.736463] Bluetooth: hci3: command 0x0419 tx timeout [ 87.738628] Bluetooth: hci4: command 0x0419 tx timeout [ 87.798700] Bluetooth: hci5: command 0x0419 tx timeout [ 87.800287] Bluetooth: hci6: command 0x0419 tx timeout [ 133.402779] audit: type=1400 audit(1663090683.715:7): avc: denied { open } for pid=3735 comm="syz-executor.7" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 133.411000] audit: type=1400 audit(1663090683.723:8): avc: denied { kernel } for pid=3735 comm="syz-executor.7" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 133.419560] ------------[ cut here ]------------ [ 133.419579] [ 133.419582] ====================================================== [ 133.419585] WARNING: possible circular locking dependency detected [ 133.419590] 6.0.0-rc5-next-20220913 #1 Not tainted [ 133.419596] ------------------------------------------------------ [ 133.419600] syz-executor.7/3737 is trying to acquire lock: [ 133.419606] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 133.419644] [ 133.419644] but task is already holding lock: [ 133.419647] ffff88804123a020 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 133.419675] [ 133.419675] which lock already depends on the new lock. [ 133.419675] [ 133.419678] [ 133.419678] the existing dependency chain (in reverse order) is: [ 133.419682] [ 133.419682] -> #3 (&ctx->lock){....}-{2:2}: [ 133.419696] _raw_spin_lock+0x2a/0x40 [ 133.419713] __perf_event_task_sched_out+0x53b/0x18d0 [ 133.419725] __schedule+0xedd/0x2470 [ 133.419736] schedule+0xda/0x1b0 [ 133.419745] exit_to_user_mode_prepare+0x114/0x1a0 [ 133.419766] syscall_exit_to_user_mode+0x19/0x40 [ 133.419784] do_syscall_64+0x48/0x90 [ 133.419798] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 133.419816] [ 133.419816] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 133.419829] _raw_spin_lock_nested+0x30/0x40 [ 133.419844] raw_spin_rq_lock_nested+0x1e/0x30 [ 133.419858] task_fork_fair+0x63/0x4d0 [ 133.419875] sched_cgroup_fork+0x3d0/0x540 [ 133.419890] copy_process+0x3f9e/0x6df0 [ 133.419900] kernel_clone+0xe7/0x890 [ 133.419909] user_mode_thread+0xad/0xf0 [ 133.419920] rest_init+0x24/0x250 [ 133.419936] arch_call_rest_init+0xf/0x14 [ 133.419957] start_kernel+0x4c1/0x4e6 [ 133.419974] secondary_startup_64_no_verify+0xe0/0xeb [ 133.419988] [ 133.419988] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 133.420002] _raw_spin_lock_irqsave+0x39/0x60 [ 133.420017] try_to_wake_up+0xab/0x1920 [ 133.420030] up+0x75/0xb0 [ 133.420041] __up_console_sem+0x6e/0x80 [ 133.420058] console_unlock+0x46a/0x590 [ 133.420074] vt_ioctl+0x2822/0x2ca0 [ 133.420087] tty_ioctl+0x7c4/0x1700 [ 133.420098] __x64_sys_ioctl+0x19a/0x210 [ 133.420114] do_syscall_64+0x3b/0x90 [ 133.420127] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 133.420144] [ 133.420144] -> #0 ((console_sem).lock){....}-{2:2}: [ 133.420157] __lock_acquire+0x2a02/0x5e70 [ 133.420174] lock_acquire+0x1a2/0x530 [ 133.420190] _raw_spin_lock_irqsave+0x39/0x60 [ 133.420205] down_trylock+0xe/0x70 [ 133.420218] __down_trylock_console_sem+0x3b/0xd0 [ 133.420234] vprintk_emit+0x16b/0x560 [ 133.420251] vprintk+0x84/0xa0 [ 133.420267] _printk+0xba/0xf1 [ 133.420285] report_bug.cold+0x72/0xab [ 133.420298] handle_bug+0x3c/0x70 [ 133.420310] exc_invalid_op+0x14/0x50 [ 133.420323] asm_exc_invalid_op+0x16/0x20 [ 133.420340] group_sched_out.part.0+0x2c7/0x460 [ 133.420350] ctx_sched_out+0x8f1/0xc10 [ 133.420360] __perf_event_task_sched_out+0x6d0/0x18d0 [ 133.420372] __schedule+0xedd/0x2470 [ 133.420381] schedule+0xda/0x1b0 [ 133.420391] exit_to_user_mode_prepare+0x114/0x1a0 [ 133.420410] syscall_exit_to_user_mode+0x19/0x40 [ 133.420427] do_syscall_64+0x48/0x90 [ 133.420440] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 133.420457] [ 133.420457] other info that might help us debug this: [ 133.420457] [ 133.420460] Chain exists of: [ 133.420460] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 133.420460] [ 133.420475] Possible unsafe locking scenario: [ 133.420475] [ 133.420477] CPU0 CPU1 [ 133.420480] ---- ---- [ 133.420482] lock(&ctx->lock); [ 133.420488] lock(&rq->__lock); [ 133.420494] lock(&ctx->lock); [ 133.420501] lock((console_sem).lock); [ 133.420506] [ 133.420506] *** DEADLOCK *** [ 133.420506] [ 133.420508] 2 locks held by syz-executor.7/3737: [ 133.420515] #0: ffff88806cf37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 133.420540] #1: ffff88804123a020 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 133.420568] [ 133.420568] stack backtrace: [ 133.420571] CPU: 1 PID: 3737 Comm: syz-executor.7 Not tainted 6.0.0-rc5-next-20220913 #1 [ 133.420583] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 133.420592] Call Trace: [ 133.420595] [ 133.420599] dump_stack_lvl+0x8b/0xb3 [ 133.420613] check_noncircular+0x263/0x2e0 [ 133.420630] ? format_decode+0x26c/0xb50 [ 133.420646] ? print_circular_bug+0x450/0x450 [ 133.420663] ? enable_ptr_key_workfn+0x20/0x20 [ 133.420677] ? __lockdep_reset_lock+0x180/0x180 [ 133.420694] ? format_decode+0x26c/0xb50 [ 133.420710] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 133.420728] __lock_acquire+0x2a02/0x5e70 [ 133.420749] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 133.420772] lock_acquire+0x1a2/0x530 [ 133.420789] ? down_trylock+0xe/0x70 [ 133.420804] ? rcu_read_unlock+0x40/0x40 [ 133.420821] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 133.420843] ? vprintk+0x84/0xa0 [ 133.420861] _raw_spin_lock_irqsave+0x39/0x60 [ 133.420877] ? down_trylock+0xe/0x70 [ 133.420890] down_trylock+0xe/0x70 [ 133.420904] ? vprintk+0x84/0xa0 [ 133.420921] __down_trylock_console_sem+0x3b/0xd0 [ 133.420939] vprintk_emit+0x16b/0x560 [ 133.420956] ? lock_downgrade+0x6d0/0x6d0 [ 133.420975] vprintk+0x84/0xa0 [ 133.420992] _printk+0xba/0xf1 [ 133.421010] ? record_print_text.cold+0x16/0x16 [ 133.421030] ? hrtimer_try_to_cancel+0x163/0x2c0 [ 133.421045] ? lock_downgrade+0x6d0/0x6d0 [ 133.421063] ? report_bug.cold+0x66/0xab [ 133.421077] ? group_sched_out.part.0+0x2c7/0x460 [ 133.421088] report_bug.cold+0x72/0xab [ 133.421103] handle_bug+0x3c/0x70 [ 133.421117] exc_invalid_op+0x14/0x50 [ 133.421131] asm_exc_invalid_op+0x16/0x20 [ 133.421149] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 133.421162] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 133.421173] RSP: 0018:ffff888019c1fc48 EFLAGS: 00010006 [ 133.421182] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 133.421190] RDX: ffff888040820000 RSI: ffffffff81566027 RDI: 0000000000000005 [ 133.421198] RBP: ffff888015ee0000 R08: 0000000000000005 R09: 0000000000000001 [ 133.421205] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88804123a000 [ 133.421213] R13: ffff88806cf3d100 R14: ffffffff8547bfc0 R15: 0000000000000002 [ 133.421224] ? group_sched_out.part.0+0x2c7/0x460 [ 133.421237] ? group_sched_out.part.0+0x2c7/0x460 [ 133.421250] ctx_sched_out+0x8f1/0xc10 [ 133.421263] __perf_event_task_sched_out+0x6d0/0x18d0 [ 133.421278] ? lock_is_held_type+0xd7/0x130 [ 133.421297] ? __perf_cgroup_move+0x160/0x160 [ 133.421309] ? set_next_entity+0x304/0x550 [ 133.421327] ? update_curr+0x267/0x740 [ 133.421346] ? lock_is_held_type+0xd7/0x130 [ 133.421364] __schedule+0xedd/0x2470 [ 133.421377] ? io_schedule_timeout+0x150/0x150 [ 133.421390] ? __x64_sys_futex_time32+0x480/0x480 [ 133.421404] schedule+0xda/0x1b0 [ 133.421415] exit_to_user_mode_prepare+0x114/0x1a0 [ 133.421436] syscall_exit_to_user_mode+0x19/0x40 [ 133.421454] do_syscall_64+0x48/0x90 [ 133.421468] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 133.421486] RIP: 0033:0x7f6255e1ab19 [ 133.421495] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 133.421506] RSP: 002b:00007f6253390218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 133.421517] RAX: 0000000000000001 RBX: 00007f6255f2df68 RCX: 00007f6255e1ab19 [ 133.421524] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f6255f2df6c [ 133.421532] RBP: 00007f6255f2df60 R08: 000000000000000e R09: 0000000000000000 [ 133.421539] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f6255f2df6c [ 133.421546] R13: 00007ffdb639f9df R14: 00007f6253390300 R15: 0000000000022000 [ 133.421559] [ 133.476642] WARNING: CPU: 1 PID: 3737 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 133.477312] Modules linked in: [ 133.477529] CPU: 1 PID: 3737 Comm: syz-executor.7 Not tainted 6.0.0-rc5-next-20220913 #1 [ 133.478080] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 133.478876] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 133.479258] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 133.480499] RSP: 0018:ffff888019c1fc48 EFLAGS: 00010006 [ 133.480883] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 133.481381] RDX: ffff888040820000 RSI: ffffffff81566027 RDI: 0000000000000005 [ 133.481874] RBP: ffff888015ee0000 R08: 0000000000000005 R09: 0000000000000001 [ 133.482364] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88804123a000 [ 133.482869] R13: ffff88806cf3d100 R14: ffffffff8547bfc0 R15: 0000000000000002 [ 133.483368] FS: 00007f6253390700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 133.483926] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 133.484337] CR2: 00007ffd2f7cd020 CR3: 0000000040956000 CR4: 0000000000350ee0 [ 133.484828] Call Trace: [ 133.485004] [ 133.485160] ctx_sched_out+0x8f1/0xc10 [ 133.485438] __perf_event_task_sched_out+0x6d0/0x18d0 [ 133.485821] ? lock_is_held_type+0xd7/0x130 [ 133.486152] ? __perf_cgroup_move+0x160/0x160 [ 133.486489] ? set_next_entity+0x304/0x550 [ 133.486828] ? update_curr+0x267/0x740 [ 133.487130] ? lock_is_held_type+0xd7/0x130 [ 133.487464] __schedule+0xedd/0x2470 [ 133.487745] ? io_schedule_timeout+0x150/0x150 [ 133.488095] ? __x64_sys_futex_time32+0x480/0x480 [ 133.488460] schedule+0xda/0x1b0 [ 133.488715] exit_to_user_mode_prepare+0x114/0x1a0 [ 133.489093] syscall_exit_to_user_mode+0x19/0x40 [ 133.489451] do_syscall_64+0x48/0x90 [ 133.489706] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 133.490052] RIP: 0033:0x7f6255e1ab19 [ 133.490321] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 133.491677] RSP: 002b:00007f6253390218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 133.492233] RAX: 0000000000000001 RBX: 00007f6255f2df68 RCX: 00007f6255e1ab19 [ 133.492756] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f6255f2df6c [ 133.493283] RBP: 00007f6255f2df60 R08: 000000000000000e R09: 0000000000000000 [ 133.493811] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f6255f2df6c [ 133.494349] R13: 00007ffdb639f9df R14: 00007f6253390300 R15: 0000000000022000 [ 133.494885] [ 133.495056] irq event stamp: 712 [ 133.495307] hardirqs last enabled at (711): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 133.495989] hardirqs last disabled at (712): [] __schedule+0x1225/0x2470 [ 133.496545] softirqs last enabled at (538): [] __irq_exit_rcu+0x11b/0x180 [ 133.497150] softirqs last disabled at (529): [] __irq_exit_rcu+0x11b/0x180 [ 133.497782] ---[ end trace 0000000000000000 ]--- 17:38:04 executing program 4: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_security(0x11, r0, &(0x7f0000000140)=""/192, 0xc0) 17:38:04 executing program 4: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_security(0x11, r0, &(0x7f0000000140)=""/192, 0xc0) 17:38:04 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f0000000480)=""/251) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545ea8ef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ca9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x1, 0x80, 0xf7, 0x30, 0x3, 0x8, 0x0, 0x7a8c, 0x820, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x582e}, 0x50, 0x5, 0x3, 0x5, 0x9, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/136}, 0x90, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(0x0, &(0x7f0000000580)={0x1, "299c785aee3c066b23989475db52bbf77b34e71114bcfae9f6aeabe52abac8f4db8229be63d6874bb3f01332e55c8d2fd817661c46eec77e2a561805e0"}, 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 17:38:04 executing program 4: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_security(0x11, r0, &(0x7f0000000140)=""/192, 0xc0) 17:38:04 executing program 4: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_security(0x11, r0, &(0x7f0000000140)=""/192, 0xc0) 17:38:04 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f0000000480)=""/251) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545ea8ef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ca9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x1, 0x80, 0xf7, 0x30, 0x3, 0x8, 0x0, 0x7a8c, 0x820, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x582e}, 0x50, 0x5, 0x3, 0x5, 0x9, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/136}, 0x90, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(0x0, &(0x7f0000000580)={0x1, "299c785aee3c066b23989475db52bbf77b34e71114bcfae9f6aeabe52abac8f4db8229be63d6874bb3f01332e55c8d2fd817661c46eec77e2a561805e0"}, 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) [ 134.235581] hrtimer: interrupt took 18956 ns 17:38:04 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f0000000480)=""/251) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545ea8ef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ca9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x1, 0x80, 0xf7, 0x30, 0x3, 0x8, 0x0, 0x7a8c, 0x820, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x582e}, 0x50, 0x5, 0x3, 0x5, 0x9, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/136}, 0x90, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(0x0, &(0x7f0000000580)={0x1, "299c785aee3c066b23989475db52bbf77b34e71114bcfae9f6aeabe52abac8f4db8229be63d6874bb3f01332e55c8d2fd817661c46eec77e2a561805e0"}, 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 17:38:04 executing program 4: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f0000000480)=""/251) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545ea8ef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ca9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x1, 0x80, 0xf7, 0x30, 0x3, 0x8, 0x0, 0x7a8c, 0x820, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x582e}, 0x50, 0x5, 0x3, 0x5, 0x9, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/136}, 0x90, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(0x0, &(0x7f0000000580)={0x1, "299c785aee3c066b23989475db52bbf77b34e71114bcfae9f6aeabe52abac8f4db8229be63d6874bb3f01332e55c8d2fd817661c46eec77e2a561805e0"}, 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) [ 136.336350] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.6'. 17:38:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000a40)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@sec_ctx={0xc, 0x8, {0x8}}]}, 0xcc}}, 0x0) 17:38:06 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f0000000480)=""/251) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545ea8ef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ca9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x1, 0x80, 0xf7, 0x30, 0x3, 0x8, 0x0, 0x7a8c, 0x820, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x582e}, 0x50, 0x5, 0x3, 0x5, 0x9, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/136}, 0x90, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(0x0, &(0x7f0000000580)={0x1, "299c785aee3c066b23989475db52bbf77b34e71114bcfae9f6aeabe52abac8f4db8229be63d6874bb3f01332e55c8d2fd817661c46eec77e2a561805e0"}, 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 17:38:06 executing program 4: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f0000000480)=""/251) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545ea8ef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ca9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x1, 0x80, 0xf7, 0x30, 0x3, 0x8, 0x0, 0x7a8c, 0x820, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x582e}, 0x50, 0x5, 0x3, 0x5, 0x9, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/136}, 0x90, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(0x0, &(0x7f0000000580)={0x1, "299c785aee3c066b23989475db52bbf77b34e71114bcfae9f6aeabe52abac8f4db8229be63d6874bb3f01332e55c8d2fd817661c46eec77e2a561805e0"}, 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 17:38:06 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @random="671700", @void, {@ipv4={0x800, @igmp={{0x8, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @dev, @remote}, {0x0, 0x0, 0x0, @empty}}}}}, 0x0) 17:38:06 executing program 2: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f0000000480)=""/251) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545ea8ef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ca9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x1, 0x80, 0xf7, 0x30, 0x3, 0x8, 0x0, 0x7a8c, 0x820, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x582e}, 0x50, 0x5, 0x3, 0x5, 0x9, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/136}, 0x90, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(0x0, &(0x7f0000000580)={0x1, "299c785aee3c066b23989475db52bbf77b34e71114bcfae9f6aeabe52abac8f4db8229be63d6874bb3f01332e55c8d2fd817661c46eec77e2a561805e0"}, 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 17:38:06 executing program 6: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r1, 0x87d27e71721737b5, 0x0, 0x0, {{0x32}, {@void, @val={0x8}, @val={0x2f}}}}, 0x28}}, 0x0) 17:38:06 executing program 3: iopl(0x1) [ 136.656759] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.6'. 17:38:06 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, '\x00', 0x2}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f00000005c0)=""/4096, &(0x7f0000000300)=0x1000) 17:38:06 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @random="671700", @void, {@ipv4={0x800, @igmp={{0x8, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @dev, @remote}, {0x0, 0x0, 0x0, @empty}}}}}, 0x0) 17:38:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000a40)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@sec_ctx={0xc, 0x8, {0x8}}]}, 0xcc}}, 0x0) 17:38:07 executing program 3: iopl(0x1) 17:38:07 executing program 6: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r1, 0x87d27e71721737b5, 0x0, 0x0, {{0x32}, {@void, @val={0x8}, @val={0x2f}}}}, 0x28}}, 0x0) 17:38:07 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, '\x00', 0x2}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f00000005c0)=""/4096, &(0x7f0000000300)=0x1000) 17:38:07 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f0000000480)=""/251) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545ea8ef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ca9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x1, 0x80, 0xf7, 0x30, 0x3, 0x8, 0x0, 0x7a8c, 0x820, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x582e}, 0x50, 0x5, 0x3, 0x5, 0x9, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/136}, 0x90, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(0x0, &(0x7f0000000580)={0x1, "299c785aee3c066b23989475db52bbf77b34e71114bcfae9f6aeabe52abac8f4db8229be63d6874bb3f01332e55c8d2fd817661c46eec77e2a561805e0"}, 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 17:38:07 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @random="671700", @void, {@ipv4={0x800, @igmp={{0x8, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @dev, @remote}, {0x0, 0x0, 0x0, @empty}}}}}, 0x0) 17:38:07 executing program 2: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f0000000480)=""/251) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545ea8ef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ca9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x1, 0x80, 0xf7, 0x30, 0x3, 0x8, 0x0, 0x7a8c, 0x820, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x582e}, 0x50, 0x5, 0x3, 0x5, 0x9, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/136}, 0x90, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(0x0, &(0x7f0000000580)={0x1, "299c785aee3c066b23989475db52bbf77b34e71114bcfae9f6aeabe52abac8f4db8229be63d6874bb3f01332e55c8d2fd817661c46eec77e2a561805e0"}, 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 17:38:07 executing program 4: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f0000000480)=""/251) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545ea8ef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ca9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x1, 0x80, 0xf7, 0x30, 0x3, 0x8, 0x0, 0x7a8c, 0x820, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x582e}, 0x50, 0x5, 0x3, 0x5, 0x9, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/136}, 0x90, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(0x0, &(0x7f0000000580)={0x1, "299c785aee3c066b23989475db52bbf77b34e71114bcfae9f6aeabe52abac8f4db8229be63d6874bb3f01332e55c8d2fd817661c46eec77e2a561805e0"}, 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) [ 136.802705] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.6'. 17:38:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000a40)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@sec_ctx={0xc, 0x8, {0x8}}]}, 0xcc}}, 0x0) 17:38:07 executing program 6: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r1, 0x87d27e71721737b5, 0x0, 0x0, {{0x32}, {@void, @val={0x8}, @val={0x2f}}}}, 0x28}}, 0x0) 17:38:07 executing program 3: iopl(0x1) 17:38:07 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, '\x00', 0x2}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f00000005c0)=""/4096, &(0x7f0000000300)=0x1000) 17:38:07 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f0000000480)=""/251) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545ea8ef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ca9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x1, 0x80, 0xf7, 0x30, 0x3, 0x8, 0x0, 0x7a8c, 0x820, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x582e}, 0x50, 0x5, 0x3, 0x5, 0x9, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/136}, 0x90, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(0x0, &(0x7f0000000580)={0x1, "299c785aee3c066b23989475db52bbf77b34e71114bcfae9f6aeabe52abac8f4db8229be63d6874bb3f01332e55c8d2fd817661c46eec77e2a561805e0"}, 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) [ 136.896790] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.6'. 17:38:07 executing program 6: sched_setattr(0x0, &(0x7f0000000000)={0x38, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff36cf, 0x9, 0x80000000, 0x4ee, 0x4}, 0x0) fork() mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x4000010, 0xffffffffffffffff, 0x10000000) 17:38:07 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f0000000480)=""/251) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545ea8ef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ca9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x1, 0x80, 0xf7, 0x30, 0x3, 0x8, 0x0, 0x7a8c, 0x820, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x582e}, 0x50, 0x5, 0x3, 0x5, 0x9, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/136}, 0x90, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(0x0, &(0x7f0000000580)={0x1, "299c785aee3c066b23989475db52bbf77b34e71114bcfae9f6aeabe52abac8f4db8229be63d6874bb3f01332e55c8d2fd817661c46eec77e2a561805e0"}, 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 17:38:07 executing program 2: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f0000000480)=""/251) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545ea8ef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ca9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x1, 0x80, 0xf7, 0x30, 0x3, 0x8, 0x0, 0x7a8c, 0x820, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x582e}, 0x50, 0x5, 0x3, 0x5, 0x9, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/136}, 0x90, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(0x0, &(0x7f0000000580)={0x1, "299c785aee3c066b23989475db52bbf77b34e71114bcfae9f6aeabe52abac8f4db8229be63d6874bb3f01332e55c8d2fd817661c46eec77e2a561805e0"}, 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 17:38:07 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f0000000480)=""/251) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545ea8ef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ca9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x1, 0x80, 0xf7, 0x30, 0x3, 0x8, 0x0, 0x7a8c, 0x820, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x582e}, 0x50, 0x5, 0x3, 0x5, 0x9, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/136}, 0x90, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(0x0, &(0x7f0000000580)={0x1, "299c785aee3c066b23989475db52bbf77b34e71114bcfae9f6aeabe52abac8f4db8229be63d6874bb3f01332e55c8d2fd817661c46eec77e2a561805e0"}, 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 17:38:07 executing program 0: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f0000000480)=""/251) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545ea8ef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ca9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x1, 0x80, 0xf7, 0x30, 0x3, 0x8, 0x0, 0x7a8c, 0x820, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x582e}, 0x50, 0x5, 0x3, 0x5, 0x9, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/136}, 0x90, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(0x0, &(0x7f0000000580)={0x1, "299c785aee3c066b23989475db52bbf77b34e71114bcfae9f6aeabe52abac8f4db8229be63d6874bb3f01332e55c8d2fd817661c46eec77e2a561805e0"}, 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 17:38:07 executing program 3: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f0000000480)=""/251) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545ea8ef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ca9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x1, 0x80, 0xf7, 0x30, 0x3, 0x8, 0x0, 0x7a8c, 0x820, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x582e}, 0x50, 0x5, 0x3, 0x5, 0x9, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/136}, 0x90, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(0x0, &(0x7f0000000580)={0x1, "299c785aee3c066b23989475db52bbf77b34e71114bcfae9f6aeabe52abac8f4db8229be63d6874bb3f01332e55c8d2fd817661c46eec77e2a561805e0"}, 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 17:38:07 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f0000000480)=""/251) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545ea8ef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ca9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x1, 0x80, 0xf7, 0x30, 0x3, 0x8, 0x0, 0x7a8c, 0x820, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x582e}, 0x50, 0x5, 0x3, 0x5, 0x9, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/136}, 0x90, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(0x0, &(0x7f0000000580)={0x1, "299c785aee3c066b23989475db52bbf77b34e71114bcfae9f6aeabe52abac8f4db8229be63d6874bb3f01332e55c8d2fd817661c46eec77e2a561805e0"}, 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 17:38:07 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) removexattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=@known='system.posix_acl_default\x00') 17:38:07 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000002c0), 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000001600)) 17:38:07 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) 17:38:07 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f0000000480)=""/251) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545ea8ef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ca9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x1, 0x80, 0xf7, 0x30, 0x3, 0x8, 0x0, 0x7a8c, 0x820, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x582e}, 0x50, 0x5, 0x3, 0x5, 0x9, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/136}, 0x90, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(0x0, &(0x7f0000000580)={0x1, "299c785aee3c066b23989475db52bbf77b34e71114bcfae9f6aeabe52abac8f4db8229be63d6874bb3f01332e55c8d2fd817661c46eec77e2a561805e0"}, 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 17:38:07 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f0000000480)=""/251) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545ea8ef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ca9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x1, 0x80, 0xf7, 0x30, 0x3, 0x8, 0x0, 0x7a8c, 0x820, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x582e}, 0x50, 0x5, 0x3, 0x5, 0x9, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/136}, 0x90, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(0x0, &(0x7f0000000580)={0x1, "299c785aee3c066b23989475db52bbf77b34e71114bcfae9f6aeabe52abac8f4db8229be63d6874bb3f01332e55c8d2fd817661c46eec77e2a561805e0"}, 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 17:38:07 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000002c0), 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000001600)) 17:38:07 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f00000000c0)) 17:38:07 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000002c0), 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000001600)) 17:38:07 executing program 0: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f0000000480)=""/251) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545ea8ef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ca9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x1, 0x80, 0xf7, 0x30, 0x3, 0x8, 0x0, 0x7a8c, 0x820, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x582e}, 0x50, 0x5, 0x3, 0x5, 0x9, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/136}, 0x90, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(0x0, &(0x7f0000000580)={0x1, "299c785aee3c066b23989475db52bbf77b34e71114bcfae9f6aeabe52abac8f4db8229be63d6874bb3f01332e55c8d2fd817661c46eec77e2a561805e0"}, 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 17:38:07 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) io_setup(0x1f, &(0x7f0000000100)=0x0) io_submit(r1, 0x2, &(0x7f0000000780)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000000)="762f6568418fe9150b", 0x9}]) 17:38:07 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f0000000480)=""/251) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545ea8ef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ca9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x1, 0x80, 0xf7, 0x30, 0x3, 0x8, 0x0, 0x7a8c, 0x820, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x582e}, 0x50, 0x5, 0x3, 0x5, 0x9, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/136}, 0x90, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(0x0, &(0x7f0000000580)={0x1, "299c785aee3c066b23989475db52bbf77b34e71114bcfae9f6aeabe52abac8f4db8229be63d6874bb3f01332e55c8d2fd817661c46eec77e2a561805e0"}, 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 17:38:07 executing program 2: r0 = syz_io_uring_setup(0x137, &(0x7f00000003c0), &(0x7f0000ff7000/0x9000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000380)=0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(r0, 0x100001, 0x0, 0x0, 0x0, 0x0) 17:38:07 executing program 0: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f0000000480)=""/251) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545ea8ef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ca9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x1, 0x80, 0xf7, 0x30, 0x3, 0x8, 0x0, 0x7a8c, 0x820, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x582e}, 0x50, 0x5, 0x3, 0x5, 0x9, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/136}, 0x90, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(0x0, &(0x7f0000000580)={0x1, "299c785aee3c066b23989475db52bbf77b34e71114bcfae9f6aeabe52abac8f4db8229be63d6874bb3f01332e55c8d2fd817661c46eec77e2a561805e0"}, 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 17:38:07 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) io_setup(0x1f, &(0x7f0000000100)=0x0) io_submit(r1, 0x2, &(0x7f0000000780)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000000)="762f6568418fe9150b", 0x9}]) 17:38:07 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000002c0), 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000001600)) 17:38:07 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000) readv(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000240)=0x1) 17:38:07 executing program 3: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f0000000480)=""/251) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545ea8ef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ca9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x1, 0x80, 0xf7, 0x30, 0x3, 0x8, 0x0, 0x7a8c, 0x820, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x582e}, 0x50, 0x5, 0x3, 0x5, 0x9, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/136}, 0x90, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(0x0, &(0x7f0000000580)={0x1, "299c785aee3c066b23989475db52bbf77b34e71114bcfae9f6aeabe52abac8f4db8229be63d6874bb3f01332e55c8d2fd817661c46eec77e2a561805e0"}, 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 17:38:07 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000100)=[{0x3c}, {0x6}]}) syz_open_dev$loop(0x0, 0x0, 0x0) 17:38:07 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) io_setup(0x1f, &(0x7f0000000100)=0x0) io_submit(r1, 0x2, &(0x7f0000000780)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000000)="762f6568418fe9150b", 0x9}]) 17:38:07 executing program 6: select(0x0, 0x0, 0x0, 0x0, &(0x7f00000042c0)) [ 138.885434] audit: type=1326 audit(1663090689.197:9): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4074 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f6255e1ab19 code=0x0 17:38:09 executing program 2: r0 = syz_io_uring_setup(0x137, &(0x7f00000003c0), &(0x7f0000ff7000/0x9000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000380)=0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(r0, 0x100001, 0x0, 0x0, 0x0, 0x0) [ 139.706632] audit: type=1326 audit(1663090690.018:10): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4074 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f6255e1ab19 code=0x0 17:38:10 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000002c80)=[{&(0x7f0000000080)={0x28, 0x25, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x2}, @typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @pid}]}, 0x28}], 0x1}, 0x0) 17:38:10 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000100)=[{0x3c}, {0x6}]}) syz_open_dev$loop(0x0, 0x0, 0x0) 17:38:10 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000) readv(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000240)=0x1) 17:38:10 executing program 3: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f0000000480)=""/251) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545ea8ef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ca9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x1, 0x80, 0xf7, 0x30, 0x3, 0x8, 0x0, 0x7a8c, 0x820, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x582e}, 0x50, 0x5, 0x3, 0x5, 0x9, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/136}, 0x90, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(0x0, &(0x7f0000000580)={0x1, "299c785aee3c066b23989475db52bbf77b34e71114bcfae9f6aeabe52abac8f4db8229be63d6874bb3f01332e55c8d2fd817661c46eec77e2a561805e0"}, 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 17:38:10 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) io_setup(0x1f, &(0x7f0000000100)=0x0) io_submit(r1, 0x2, &(0x7f0000000780)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000000)="762f6568418fe9150b", 0x9}]) 17:38:10 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 17:38:10 executing program 2: r0 = syz_io_uring_setup(0x137, &(0x7f00000003c0), &(0x7f0000ff7000/0x9000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000380)=0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(r0, 0x100001, 0x0, 0x0, 0x0, 0x0) 17:38:10 executing program 0: kexec_load(0x0, 0x0, 0x0, 0x1) [ 139.805014] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 139.862340] audit: type=1326 audit(1663090690.174:11): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4109 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f6255e1ab19 code=0x0 17:38:10 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000100)=[{0x3c}, {0x6}]}) syz_open_dev$loop(0x0, 0x0, 0x0) 17:38:10 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000002c80)=[{&(0x7f0000000080)={0x28, 0x25, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x2}, @typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @pid}]}, 0x28}], 0x1}, 0x0) 17:38:10 executing program 0: kexec_load(0x0, 0x0, 0x0, 0x1) [ 139.968519] audit: type=1326 audit(1663090690.272:12): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4113 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f9491405b19 code=0x0 17:38:10 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x5, &(0x7f0000000140)={0x6, {{0x2, 0x0, @loopback}}, {{0x2, 0x0, @loopback}}}, 0x108) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0xd0, 0x4) [ 140.003794] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 17:38:10 executing program 0: kexec_load(0x0, 0x0, 0x0, 0x1) 17:38:10 executing program 2: r0 = syz_io_uring_setup(0x137, &(0x7f00000003c0), &(0x7f0000ff7000/0x9000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000380)=0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(r0, 0x100001, 0x0, 0x0, 0x0, 0x0) 17:38:10 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x5, &(0x7f0000000140)={0x6, {{0x2, 0x0, @loopback}}, {{0x2, 0x0, @loopback}}}, 0x108) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0xd0, 0x4) 17:38:10 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000002c80)=[{&(0x7f0000000080)={0x28, 0x25, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x2}, @typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @pid}]}, 0x28}], 0x1}, 0x0) [ 140.238246] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 17:38:11 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x5, &(0x7f0000000140)={0x6, {{0x2, 0x0, @loopback}}, {{0x2, 0x0, @loopback}}}, 0x108) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0xd0, 0x4) 17:38:11 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x5, &(0x7f0000000140)={0x6, {{0x2, 0x0, @loopback}}, {{0x2, 0x0, @loopback}}}, 0x108) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0xd0, 0x4) 17:38:11 executing program 0: kexec_load(0x0, 0x0, 0x0, 0x1) 17:38:11 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000002c80)=[{&(0x7f0000000080)={0x28, 0x25, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x2}, @typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @pid}]}, 0x28}], 0x1}, 0x0) 17:38:11 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000) readv(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000240)=0x1) 17:38:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f00000005c0)=0x3c, 0x4) 17:38:11 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000100)=[{0x3c}, {0x6}]}) syz_open_dev$loop(0x0, 0x0, 0x0) 17:38:11 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000100)=[{0x3c}, {0x6}]}) syz_open_dev$loop(0x0, 0x0, 0x0) [ 140.853916] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 140.857226] audit: type=1326 audit(1663090691.169:13): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4136 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f6255e1ab19 code=0x0 [ 140.883995] audit: type=1326 audit(1663090691.196:14): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4146 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f9491405b19 code=0x0 17:38:11 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x5, &(0x7f0000000140)={0x6, {{0x2, 0x0, @loopback}}, {{0x2, 0x0, @loopback}}}, 0x108) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0xd0, 0x4) 17:38:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f00000005c0)=0x3c, 0x4) 17:38:11 executing program 0: clone3(&(0x7f0000004c00)={0xc0006500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 17:38:11 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x5, &(0x7f0000000140)={0x6, {{0x2, 0x0, @loopback}}, {{0x2, 0x0, @loopback}}}, 0x108) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0xd0, 0x4) 17:38:11 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x5, &(0x7f0000000140)={0x6, {{0x2, 0x0, @loopback}}, {{0x2, 0x0, @loopback}}}, 0x108) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0xd0, 0x4) 17:38:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f00000005c0)=0x3c, 0x4) 17:38:11 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x56ad, &(0x7f0000000140)={0x0, 0x6c4c, 0x0, 0x2}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000300)=0x0) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) fork() openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f0000000780)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000200)='./file0\x00', 0x800, 0x6000}, 0x0) 17:38:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000240)='\"', 0x1}], 0x1, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$bt_hci(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRESHEX, @ANYRESOCT], 0x5) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x100000) [ 141.086820] audit: type=1400 audit(1663090691.399:15): avc: denied { tracepoint } for pid=4160 comm="syz-executor.6" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 17:38:11 executing program 0: clone3(&(0x7f0000004c00)={0xc0006500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 17:38:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:38:11 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000) readv(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000240)=0x1) 17:38:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f00000005c0)=0x3c, 0x4) 17:38:11 executing program 3: io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='!/.)\x94}\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x44, 0x0, "704f5992d666aa2888e479ca552ee155f638582a91ca97213cf4774a2e4c350cdc3f9f62a4c21970bd149a52fa311b916bf00b51b808c412ed6b9fcbb5be4a2fb7dd8fd0dfa22b4100"}, 0xd8) 17:38:11 executing program 0: clone3(&(0x7f0000004c00)={0xc0006500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 141.333635] audit: type=1400 audit(1663090691.643:16): avc: denied { write } for pid=4176 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 17:38:12 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000100)=[{0x3c}, {0x6}]}) syz_open_dev$loop(0x0, 0x0, 0x0) 17:38:12 executing program 2: [ 141.761121] loop2: detected capacity change from 0 to 512 syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x16, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002000028020000028401001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e38333735393934343800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="0000000000000000000000001bb3a207e2d04cff8ff0e42050b3d130010000000c00000000000000dbf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003900000000000000", 0x40, 0x540}, {&(0x7f0000010300)="0000000000000000000000000000000000000000010400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000dbf4655fdbf4655fdbf4655f00"/8224, 0x2020, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f00000000000004000800000000000000050000000800"/64, 0x40, 0x4200}, {&(0x7f0000012700)="20000000482a2723482a272300000000dbf4655f00"/32, 0x20, 0x4280}, {&(0x7f0000012800)="c041000000300000dbf4655fdbf4655fdbf4655f0000000000000200180000000000000000000000090000000a0000000b00"/64, 0x40, 0x5400}, {&(0x7f0000012900)="20000000000000000000000000000000dbf4655f000000000000000000000000000002ea00"/64, 0x40, 0x5480}, {&(0x7f0000012a00)="ed4100003c000000dcf4655fdcf4655fdcf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c6531000000000000000000000000000000000000000000000000000000e6b4b61700000000000000000000000000000000000000000000000020000000482a2723482a2723482a2723dcf4655f482a27230000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x5600}, {&(0x7f0000012b00)="ed8100001a040000dcf4655fdcf4655fdcf4655f00000000000001000800000000000000010000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001df408b00000000000000000000000000000000000000000000000020000000482a2723482a2723482a2723dcf4655f482a27230000000000000000", 0xa0, 0x5800}, {&(0x7f0000012c00)="ffa1000026000000dcf4655fdcf4655fdcf4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833373539393434382f66696c65302f66696c6530000000000000000000000000000000000000000000006f9eb2d200000000000000000000000000000000000000000000000020000000482a2723482a2723482a2723dcf4655f482a27230000000000000000", 0xa0, 0x5a00}, {&(0x7f0000012d00)="ed8100000a000000dcf4655fdcf4655fdcf4655f000000000000010000000000000000100100000073797a6b616c6c6572730000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000914f493900000000000000000000000000000000000000000000000020000000482a2723482a2723482a2723dcf4655f482a27230000000000000000000002ea040700000000000000000000000000006461746106015401000000000600000000000000786174747231000006014c0100000000060000000000000078617474723200"/256, 0x100, 0x5c00}, {&(0x7f0000012e00)="0000000000000000000000000000000078617474723200007861747472310000ed81000028230000dcf4655fdcf4655fdcf4655f00000000000002001800000000000000010000000d0000000e0000000f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de9dcec00000000000000000000000000000000000000000000000020000000482a2723482a2723482a2723dcf4655f482a27230000000000000000", 0xc0, 0x5de0}, {&(0x7f0000012f00)="ed81000064000000dcf4655fdcf4655fdcf4655f000000000000010000000000000000100100000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c68e4d45a00000000000000000000000000000000000000000000000020000000482a2723482a2723482a2723dcf4655f482a27230000000000000000000002ea04073401000000002800000000000000646174610000000000000000", 0xc0, 0x6000}, {&(0x7f0000013000)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00lersyzkallersyzkallersyzkallersyzkallers', 0x40, 0x61c0}, {&(0x7f0000013100)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c653300000011000000940f090166696c652e636f6c64000000", 0x80, 0x8000}, {&(0x7f0000013200)="0b0000000c0001022e000000020000000c0002022e2e000000000000e80f0000", 0x20, 0x9000}, {&(0x7f0000013300)="00000000001000"/32, 0x20, 0xa000}, {&(0x7f0000013400)="00000000001000"/32, 0x20, 0xb000}, {&(0x7f0000013500)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0xc000}], 0x0, &(0x7f0000013a00)) 17:38:12 executing program 1: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="68000000290000000008000000000000000000000000000000000000000007002e2f66696c65300001004000000000000000000000000000002100000007002e2f66696c653000000000000000000000000000b4e9"], 0x68) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x40, &(0x7f0000000080)={@rand_addr, @remote}, 0xc) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100), 0x0, 0x0, 0x2) openat(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) getpgid(0xffffffffffffffff) 17:38:12 executing program 3: io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='!/.)\x94}\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x44, 0x0, "704f5992d666aa2888e479ca552ee155f638582a91ca97213cf4774a2e4c350cdc3f9f62a4c21970bd149a52fa311b916bf00b51b808c412ed6b9fcbb5be4a2fb7dd8fd0dfa22b4100"}, 0xd8) 17:38:12 executing program 0: clone3(&(0x7f0000004c00)={0xc0006500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 17:38:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000240)='\"', 0x1}], 0x1, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$bt_hci(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRESHEX, @ANYRESOCT], 0x5) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, VM DIAGNOSIS: 17:38:04 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=0000000000000001 RCX=0000000000000001 RDX=0000000000000000 RSI=ffff88804151ff50 RDI=ffff88804151f8e0 RBP=ffff88804151f8d0 RSP=ffff88804151f7f8 R8 =ffffffff8623b698 R9 =ffffffff8623b69c R10=ffffed10082a3f1c R11=ffff88804151f8b8 R12=ffff88804151f8b9 R13=ffff88804151f8d8 R14=ffff88804151f878 R15=ffffffff8623b69d RIP=ffffffff8111bdc6 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ff0651936f4 CR3=0000000005226000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007ff0651a2470 00007ff0651a1f20 YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 756e20796d6d7564 20736e6f6974706f YMM04=0000000000000000 0000000000000000 2f2f2f2f2f2f2f2f 2f2f2f2f2f2f2f2f YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 73253d656d616e6c 6165722073253d73 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000065 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b25c1 RDI=ffffffff8763fae0 RBP=ffffffff8763faa0 RSP=ffff888019c1f698 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000065 R11=0000000000000001 R12=0000000000000065 R13=ffffffff8763faa0 R14=0000000000000010 R15=ffffffff822b25b0 RIP=ffffffff822b2619 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f6253390700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffd2f7cd020 CR3=0000000040956000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f6255f017c0 00007f6255f017c8 YMM02=0000000000000000 0000000000000000 00007f6255f017e0 00007f6255f017c0 YMM03=0000000000000000 0000000000000000 00007f6255f017c8 00007f6255f017c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000