Warning: Permanently added '[localhost]:58613' (ECDSA) to the list of known hosts. 2022/09/14 12:44:24 fuzzer started 2022/09/14 12:44:24 dialing manager at localhost:33849 syzkaller login: [ 41.003134] cgroup: Unknown subsys name 'net' [ 41.116324] cgroup: Unknown subsys name 'rlimit' 2022/09/14 12:44:39 syscalls: 2215 2022/09/14 12:44:39 code coverage: enabled 2022/09/14 12:44:39 comparison tracing: enabled 2022/09/14 12:44:39 extra coverage: enabled 2022/09/14 12:44:39 setuid sandbox: enabled 2022/09/14 12:44:39 namespace sandbox: enabled 2022/09/14 12:44:39 Android sandbox: enabled 2022/09/14 12:44:39 fault injection: enabled 2022/09/14 12:44:39 leak checking: enabled 2022/09/14 12:44:39 net packet injection: enabled 2022/09/14 12:44:39 net device setup: enabled 2022/09/14 12:44:39 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/14 12:44:39 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/14 12:44:39 USB emulation: enabled 2022/09/14 12:44:39 hci packet injection: enabled 2022/09/14 12:44:39 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220914) 2022/09/14 12:44:39 802.15.4 emulation: enabled 2022/09/14 12:44:39 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/14 12:44:39 fetching corpus: 40, signal 18750/22406 (executing program) 2022/09/14 12:44:39 fetching corpus: 90, signal 36065/41134 (executing program) 2022/09/14 12:44:39 fetching corpus: 140, signal 47605/53991 (executing program) 2022/09/14 12:44:39 fetching corpus: 190, signal 56629/64232 (executing program) 2022/09/14 12:44:40 fetching corpus: 240, signal 65005/73624 (executing program) 2022/09/14 12:44:40 fetching corpus: 290, signal 70545/80158 (executing program) 2022/09/14 12:44:40 fetching corpus: 340, signal 74810/85460 (executing program) 2022/09/14 12:44:40 fetching corpus: 390, signal 83732/94944 (executing program) 2022/09/14 12:44:40 fetching corpus: 440, signal 88780/100800 (executing program) 2022/09/14 12:44:40 fetching corpus: 490, signal 93260/106013 (executing program) 2022/09/14 12:44:40 fetching corpus: 540, signal 95968/109567 (executing program) 2022/09/14 12:44:41 fetching corpus: 590, signal 100194/114540 (executing program) 2022/09/14 12:44:41 fetching corpus: 640, signal 103154/118262 (executing program) 2022/09/14 12:44:41 fetching corpus: 690, signal 107220/122847 (executing program) 2022/09/14 12:44:41 fetching corpus: 740, signal 108693/125122 (executing program) 2022/09/14 12:44:41 fetching corpus: 790, signal 112956/129671 (executing program) 2022/09/14 12:44:41 fetching corpus: 840, signal 116517/133634 (executing program) 2022/09/14 12:44:42 fetching corpus: 890, signal 119867/137407 (executing program) 2022/09/14 12:44:42 fetching corpus: 940, signal 121503/139644 (executing program) 2022/09/14 12:44:42 fetching corpus: 990, signal 123662/142275 (executing program) 2022/09/14 12:44:42 fetching corpus: 1040, signal 125937/145003 (executing program) 2022/09/14 12:44:42 fetching corpus: 1090, signal 127152/146809 (executing program) 2022/09/14 12:44:42 fetching corpus: 1140, signal 130232/150081 (executing program) 2022/09/14 12:44:42 fetching corpus: 1190, signal 131829/152121 (executing program) 2022/09/14 12:44:42 fetching corpus: 1240, signal 134068/154654 (executing program) 2022/09/14 12:44:43 fetching corpus: 1290, signal 136490/157265 (executing program) 2022/09/14 12:44:43 fetching corpus: 1340, signal 137770/158965 (executing program) 2022/09/14 12:44:43 fetching corpus: 1390, signal 138750/160368 (executing program) 2022/09/14 12:44:43 fetching corpus: 1440, signal 140778/162565 (executing program) 2022/09/14 12:44:43 fetching corpus: 1490, signal 142313/164319 (executing program) 2022/09/14 12:44:43 fetching corpus: 1540, signal 144397/166561 (executing program) 2022/09/14 12:44:43 fetching corpus: 1590, signal 145977/168396 (executing program) 2022/09/14 12:44:43 fetching corpus: 1640, signal 147845/170406 (executing program) 2022/09/14 12:44:44 fetching corpus: 1690, signal 149026/171867 (executing program) 2022/09/14 12:44:44 fetching corpus: 1740, signal 152071/174507 (executing program) 2022/09/14 12:44:44 fetching corpus: 1790, signal 153877/176358 (executing program) 2022/09/14 12:44:44 fetching corpus: 1840, signal 155536/177999 (executing program) 2022/09/14 12:44:44 fetching corpus: 1890, signal 157751/180127 (executing program) 2022/09/14 12:44:44 fetching corpus: 1940, signal 159335/181686 (executing program) 2022/09/14 12:44:45 fetching corpus: 1990, signal 160459/182926 (executing program) 2022/09/14 12:44:45 fetching corpus: 2040, signal 161447/184162 (executing program) 2022/09/14 12:44:45 fetching corpus: 2090, signal 162807/185505 (executing program) 2022/09/14 12:44:45 fetching corpus: 2140, signal 163821/186590 (executing program) 2022/09/14 12:44:45 fetching corpus: 2190, signal 165171/187904 (executing program) 2022/09/14 12:44:45 fetching corpus: 2240, signal 166064/188925 (executing program) 2022/09/14 12:44:45 fetching corpus: 2290, signal 167814/190373 (executing program) 2022/09/14 12:44:45 fetching corpus: 2340, signal 169434/191772 (executing program) 2022/09/14 12:44:46 fetching corpus: 2390, signal 170639/192828 (executing program) 2022/09/14 12:44:46 fetching corpus: 2440, signal 171527/193718 (executing program) 2022/09/14 12:44:46 fetching corpus: 2490, signal 172649/194732 (executing program) 2022/09/14 12:44:46 fetching corpus: 2540, signal 174013/195792 (executing program) 2022/09/14 12:44:46 fetching corpus: 2590, signal 174698/196517 (executing program) 2022/09/14 12:44:46 fetching corpus: 2640, signal 175857/197505 (executing program) 2022/09/14 12:44:46 fetching corpus: 2690, signal 176877/198400 (executing program) 2022/09/14 12:44:47 fetching corpus: 2740, signal 177528/199078 (executing program) 2022/09/14 12:44:47 fetching corpus: 2790, signal 178584/199979 (executing program) 2022/09/14 12:44:47 fetching corpus: 2840, signal 179487/200794 (executing program) 2022/09/14 12:44:47 fetching corpus: 2890, signal 180671/201673 (executing program) 2022/09/14 12:44:47 fetching corpus: 2940, signal 181664/202432 (executing program) 2022/09/14 12:44:47 fetching corpus: 2990, signal 182593/203181 (executing program) 2022/09/14 12:44:47 fetching corpus: 3040, signal 183357/203817 (executing program) 2022/09/14 12:44:48 fetching corpus: 3089, signal 184574/204661 (executing program) 2022/09/14 12:44:48 fetching corpus: 3139, signal 185534/205339 (executing program) 2022/09/14 12:44:48 fetching corpus: 3189, signal 186324/205943 (executing program) 2022/09/14 12:44:48 fetching corpus: 3239, signal 187058/206522 (executing program) 2022/09/14 12:44:48 fetching corpus: 3289, signal 188417/207518 (executing program) 2022/09/14 12:44:48 fetching corpus: 3339, signal 189532/208242 (executing program) 2022/09/14 12:44:48 fetching corpus: 3389, signal 190482/208861 (executing program) 2022/09/14 12:44:49 fetching corpus: 3439, signal 191366/209416 (executing program) 2022/09/14 12:44:49 fetching corpus: 3489, signal 192009/209895 (executing program) 2022/09/14 12:44:49 fetching corpus: 3539, signal 192759/210425 (executing program) 2022/09/14 12:44:49 fetching corpus: 3589, signal 194031/211017 (executing program) 2022/09/14 12:44:49 fetching corpus: 3639, signal 195371/211692 (executing program) 2022/09/14 12:44:49 fetching corpus: 3689, signal 196053/212098 (executing program) 2022/09/14 12:44:49 fetching corpus: 3739, signal 197256/212595 (executing program) 2022/09/14 12:44:50 fetching corpus: 3789, signal 198284/213148 (executing program) 2022/09/14 12:44:50 fetching corpus: 3839, signal 199020/213567 (executing program) 2022/09/14 12:44:50 fetching corpus: 3889, signal 200045/213973 (executing program) 2022/09/14 12:44:50 fetching corpus: 3939, signal 200671/214304 (executing program) 2022/09/14 12:44:50 fetching corpus: 3989, signal 201556/214694 (executing program) 2022/09/14 12:44:50 fetching corpus: 4039, signal 202578/215075 (executing program) 2022/09/14 12:44:51 fetching corpus: 4089, signal 203193/215325 (executing program) 2022/09/14 12:44:51 fetching corpus: 4139, signal 204010/215637 (executing program) 2022/09/14 12:44:51 fetching corpus: 4189, signal 204833/215956 (executing program) 2022/09/14 12:44:51 fetching corpus: 4239, signal 205777/216313 (executing program) 2022/09/14 12:44:51 fetching corpus: 4289, signal 206389/216546 (executing program) 2022/09/14 12:44:51 fetching corpus: 4339, signal 207056/216760 (executing program) 2022/09/14 12:44:51 fetching corpus: 4389, signal 208028/217006 (executing program) 2022/09/14 12:44:52 fetching corpus: 4439, signal 208684/217176 (executing program) 2022/09/14 12:44:52 fetching corpus: 4489, signal 209324/217349 (executing program) 2022/09/14 12:44:52 fetching corpus: 4539, signal 210103/217517 (executing program) 2022/09/14 12:44:52 fetching corpus: 4589, signal 210455/217642 (executing program) 2022/09/14 12:44:52 fetching corpus: 4639, signal 211152/217788 (executing program) 2022/09/14 12:44:52 fetching corpus: 4641, signal 211153/217870 (executing program) 2022/09/14 12:44:52 fetching corpus: 4641, signal 211153/217941 (executing program) 2022/09/14 12:44:52 fetching corpus: 4641, signal 211153/218010 (executing program) 2022/09/14 12:44:52 fetching corpus: 4641, signal 211153/218090 (executing program) 2022/09/14 12:44:52 fetching corpus: 4641, signal 211153/218155 (executing program) 2022/09/14 12:44:52 fetching corpus: 4641, signal 211153/218228 (executing program) 2022/09/14 12:44:52 fetching corpus: 4641, signal 211153/218272 (executing program) 2022/09/14 12:44:52 fetching corpus: 4641, signal 211153/218272 (executing program) 2022/09/14 12:44:55 starting 8 fuzzer processes 12:44:55 executing program 0: uname(&(0x7f0000000040)=""/149) syz_genetlink_get_family_id$team(0x0, 0xffffffffffffffff) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xa, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) 12:44:55 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x20) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), r1) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="000427bd7000ffdbdf250c0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060002003c00000014000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000008000400e90a0000080006000200000008000400000000000800040000010000"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x40104, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c6d6d61702c76657273696f6e3d3970323030302e752c756e6f059adf2c2d5c2f2f2840262d285c297d2c76657273696f6e3d3970323030302e4c2c63616368657461673d68756765746c626673002c70726976706f72742c61636365736d61636b66736861743d2e2c66b9285eea69633d3078303030303030303030303030306666662c7569643c8dc866cabdb8888a9e488038b5aaadd96b78f3c977f83c29d5", @ANYRESDEC, @ANYBLOB="2c736d61636b6673666c6f6f723d68756765746c626673002c646f6e745f6d8861737572652c736d7b636b66736861743d5e2c736d61636b66736861743d68757765746c626673002c00"]) 12:44:55 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) 12:44:55 executing program 3: utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x51ec3a86ad131823) [ 70.006556] audit: type=1400 audit(1663159495.067:6): avc: denied { execmem } for pid=283 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 12:44:55 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) mknodat$loop(r0, &(0x7f0000000540)='./file0\x00', 0x0, 0x1) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) fchownat(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0xee01, 0x0) 12:44:55 executing program 5: syz_emit_ethernet(0x33, &(0x7f00000001c0)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "2ddc20", 0x30, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "f2e2a6", 0x0, 0x0, 0x0, @private2, @loopback}}}}}}}, 0x0) 12:44:55 executing program 6: keyctl$set_reqkey_keyring(0xe, 0x1) r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd=r0}, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0x0) 12:44:55 executing program 7: pselect6(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0) [ 71.273747] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 71.275872] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 71.277557] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 71.279210] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 71.280775] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 71.282057] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 71.283128] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 71.284282] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 71.285575] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 71.287031] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 71.288132] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 71.289280] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 71.302910] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 71.305698] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 71.307643] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 71.308758] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 71.309776] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 71.311110] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 71.312603] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 71.313692] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 71.315813] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 71.317131] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 71.318162] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 71.319353] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 71.320478] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 71.322318] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 71.324320] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 71.325631] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 71.327224] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 71.328484] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 71.331290] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 71.332621] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 71.337294] Bluetooth: hci1: HCI_REQ-0x0c1a [ 71.344221] Bluetooth: hci2: HCI_REQ-0x0c1a [ 71.346109] Bluetooth: hci0: HCI_REQ-0x0c1a [ 71.347043] Bluetooth: hci3: HCI_REQ-0x0c1a [ 71.348133] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 71.350709] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 71.361354] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 71.361748] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 71.367913] Bluetooth: hci5: HCI_REQ-0x0c1a [ 71.374095] Bluetooth: hci4: HCI_REQ-0x0c1a [ 71.569320] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 71.580254] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 71.603441] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 71.633268] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 71.660307] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 71.675366] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 71.693308] Bluetooth: hci7: HCI_REQ-0x0c1a [ 73.399868] Bluetooth: hci4: command 0x0409 tx timeout [ 73.400650] Bluetooth: hci1: command 0x0409 tx timeout [ 73.401932] Bluetooth: hci6: Opcode 0x c03 failed: -110 [ 73.408053] Bluetooth: hci3: command 0x0409 tx timeout [ 73.409120] Bluetooth: hci0: command 0x0409 tx timeout [ 73.410122] Bluetooth: hci2: command 0x0409 tx timeout [ 73.463195] Bluetooth: hci5: command 0x0409 tx timeout [ 73.719046] Bluetooth: hci7: command 0x0409 tx timeout [ 75.447609] Bluetooth: hci2: command 0x041b tx timeout [ 75.448417] Bluetooth: hci0: command 0x041b tx timeout [ 75.449182] Bluetooth: hci3: command 0x041b tx timeout [ 75.450138] Bluetooth: hci1: command 0x041b tx timeout [ 75.450845] Bluetooth: hci4: command 0x041b tx timeout [ 75.511029] Bluetooth: hci5: command 0x041b tx timeout [ 75.767058] Bluetooth: hci7: command 0x041b tx timeout [ 76.556868] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 76.561570] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 76.562579] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 76.564484] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 76.566111] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 76.566803] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 76.569550] Bluetooth: hci6: HCI_REQ-0x0c1a [ 77.495048] Bluetooth: hci4: command 0x040f tx timeout [ 77.495556] Bluetooth: hci1: command 0x040f tx timeout [ 77.496360] Bluetooth: hci3: command 0x040f tx timeout [ 77.496807] Bluetooth: hci0: command 0x040f tx timeout [ 77.497294] Bluetooth: hci2: command 0x040f tx timeout [ 77.559064] Bluetooth: hci5: command 0x040f tx timeout [ 77.815071] Bluetooth: hci7: command 0x040f tx timeout [ 78.583341] Bluetooth: hci6: command 0x0409 tx timeout [ 79.543259] Bluetooth: hci2: command 0x0419 tx timeout [ 79.544138] Bluetooth: hci0: command 0x0419 tx timeout [ 79.544876] Bluetooth: hci3: command 0x0419 tx timeout [ 79.546573] Bluetooth: hci1: command 0x0419 tx timeout [ 79.547574] Bluetooth: hci4: command 0x0419 tx timeout [ 79.608009] Bluetooth: hci5: command 0x0419 tx timeout [ 79.863135] Bluetooth: hci7: command 0x0419 tx timeout [ 80.631498] Bluetooth: hci6: command 0x041b tx timeout [ 82.679263] Bluetooth: hci6: command 0x040f tx timeout [ 84.727399] Bluetooth: hci6: command 0x0419 tx timeout [ 125.712128] audit: type=1326 audit(1663159550.772:7): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=3823 comm="syz-executor.2" exe="/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f24dbf95b19 code=0x0 12:45:50 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) [ 125.912042] audit: type=1326 audit(1663159550.972:8): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=3836 comm="syz-executor.2" exe="/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f24dbf95b19 code=0x0 12:45:51 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) [ 126.031183] audit: type=1326 audit(1663159551.091:9): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=3843 comm="syz-executor.2" exe="/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f24dbf95b19 code=0x0 12:45:51 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) [ 126.197018] audit: type=1326 audit(1663159551.257:10): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=3856 comm="syz-executor.2" exe="/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f24dbf95b19 code=0x0 12:45:51 executing program 5: syz_emit_ethernet(0x33, &(0x7f00000001c0)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "2ddc20", 0x30, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "f2e2a6", 0x0, 0x0, 0x0, @private2, @loopback}}}}}}}, 0x0) 12:45:51 executing program 5: syz_emit_ethernet(0x33, &(0x7f00000001c0)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "2ddc20", 0x30, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "f2e2a6", 0x0, 0x0, 0x0, @private2, @loopback}}}}}}}, 0x0) 12:45:51 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) sendmmsg$inet6(r0, &(0x7f0000002fc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4000001) 12:45:51 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) sendmmsg$inet6(r0, &(0x7f0000002fc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4000001) 12:45:51 executing program 5: syz_emit_ethernet(0x33, &(0x7f00000001c0)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "2ddc20", 0x30, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "f2e2a6", 0x0, 0x0, 0x0, @private2, @loopback}}}}}}}, 0x0) [ 127.191793] audit: type=1400 audit(1663159552.252:11): avc: denied { open } for pid=3930 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 127.193383] audit: type=1400 audit(1663159552.252:12): avc: denied { kernel } for pid=3930 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 127.201545] ------------[ cut here ]------------ [ 127.201567] [ 127.201571] ====================================================== [ 127.201575] WARNING: possible circular locking dependency detected [ 127.201579] 6.0.0-rc5-next-20220914 #1 Not tainted [ 127.201585] ------------------------------------------------------ [ 127.201589] syz-executor.1/3931 is trying to acquire lock: [ 127.201595] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 127.201634] [ 127.201634] but task is already holding lock: [ 127.201637] ffff88800d5c2820 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 127.201665] [ 127.201665] which lock already depends on the new lock. [ 127.201665] [ 127.201668] [ 127.201668] the existing dependency chain (in reverse order) is: [ 127.201671] [ 127.201671] -> #3 (&ctx->lock){....}-{2:2}: [ 127.201686] _raw_spin_lock+0x2a/0x40 [ 127.201703] __perf_event_task_sched_out+0x53b/0x18d0 [ 127.201715] __schedule+0xedd/0x2470 [ 127.201726] schedule+0xda/0x1b0 [ 127.201736] exit_to_user_mode_prepare+0x114/0x1a0 [ 127.201756] syscall_exit_to_user_mode+0x19/0x40 [ 127.201773] do_syscall_64+0x48/0x90 [ 127.201786] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 127.201804] [ 127.201804] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 127.201818] _raw_spin_lock_nested+0x30/0x40 [ 127.201832] raw_spin_rq_lock_nested+0x1e/0x30 [ 127.201845] task_fork_fair+0x63/0x4d0 [ 127.201862] sched_cgroup_fork+0x3d0/0x540 [ 127.201875] copy_process+0x4183/0x6e20 [ 127.201886] kernel_clone+0xe7/0x890 [ 127.201896] user_mode_thread+0xad/0xf0 [ 127.201906] rest_init+0x24/0x250 [ 127.201922] arch_call_rest_init+0xf/0x14 [ 127.201934] start_kernel+0x4c1/0x4e6 [ 127.201943] secondary_startup_64_no_verify+0xe0/0xeb [ 127.201961] [ 127.201961] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 127.201974] _raw_spin_lock_irqsave+0x39/0x60 [ 127.201989] try_to_wake_up+0xab/0x1920 [ 127.202002] up+0x75/0xb0 [ 127.202013] __up_console_sem+0x6e/0x80 [ 127.202029] console_unlock+0x46a/0x590 [ 127.202044] vt_ioctl+0x2822/0x2ca0 [ 127.202056] tty_ioctl+0x7c4/0x1700 [ 127.202067] __x64_sys_ioctl+0x19a/0x210 [ 127.202083] do_syscall_64+0x3b/0x90 [ 127.202096] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 127.202112] [ 127.202112] -> #0 ((console_sem).lock){....}-{2:2}: [ 127.202126] __lock_acquire+0x2a02/0x5e70 [ 127.202142] lock_acquire+0x1a2/0x530 [ 127.202157] _raw_spin_lock_irqsave+0x39/0x60 [ 127.202172] down_trylock+0xe/0x70 [ 127.202184] __down_trylock_console_sem+0x3b/0xd0 [ 127.202200] vprintk_emit+0x16b/0x560 [ 127.202215] vprintk+0x84/0xa0 [ 127.202231] _printk+0xba/0xf1 [ 127.202248] report_bug.cold+0x72/0xab [ 127.202261] handle_bug+0x3c/0x70 [ 127.202273] exc_invalid_op+0x14/0x50 [ 127.202286] asm_exc_invalid_op+0x16/0x20 [ 127.202301] group_sched_out.part.0+0x2c7/0x460 [ 127.202312] ctx_sched_out+0x8f1/0xc10 [ 127.202322] __perf_event_task_sched_out+0x6d0/0x18d0 [ 127.202334] __schedule+0xedd/0x2470 [ 127.202343] schedule+0xda/0x1b0 [ 127.202352] exit_to_user_mode_prepare+0x114/0x1a0 [ 127.202371] syscall_exit_to_user_mode+0x19/0x40 [ 127.202387] do_syscall_64+0x48/0x90 [ 127.202400] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 127.202416] [ 127.202416] other info that might help us debug this: [ 127.202416] [ 127.202419] Chain exists of: [ 127.202419] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 127.202419] [ 127.202434] Possible unsafe locking scenario: [ 127.202434] [ 127.202437] CPU0 CPU1 [ 127.202439] ---- ---- [ 127.202441] lock(&ctx->lock); [ 127.202447] lock(&rq->__lock); [ 127.202454] lock(&ctx->lock); [ 127.202460] lock((console_sem).lock); [ 127.202466] [ 127.202466] *** DEADLOCK *** [ 127.202466] [ 127.202468] 2 locks held by syz-executor.1/3931: [ 127.202475] #0: ffff88806ce37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 127.202500] #1: ffff88800d5c2820 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 127.202528] [ 127.202528] stack backtrace: [ 127.202531] CPU: 0 PID: 3931 Comm: syz-executor.1 Not tainted 6.0.0-rc5-next-20220914 #1 [ 127.202544] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 127.202552] Call Trace: [ 127.202556] [ 127.202560] dump_stack_lvl+0x8b/0xb3 [ 127.202575] check_noncircular+0x263/0x2e0 [ 127.202591] ? format_decode+0x26c/0xb50 [ 127.202606] ? print_circular_bug+0x450/0x450 [ 127.202622] ? enable_ptr_key_workfn+0x20/0x20 [ 127.202637] ? format_decode+0x26c/0xb50 [ 127.202652] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 127.202670] __lock_acquire+0x2a02/0x5e70 [ 127.202691] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 127.202713] lock_acquire+0x1a2/0x530 [ 127.202737] ? down_trylock+0xe/0x70 [ 127.202751] ? rcu_read_unlock+0x40/0x40 [ 127.202772] ? vprintk+0x84/0xa0 [ 127.202789] _raw_spin_lock_irqsave+0x39/0x60 [ 127.202804] ? down_trylock+0xe/0x70 [ 127.202817] down_trylock+0xe/0x70 [ 127.202830] ? vprintk+0x84/0xa0 [ 127.202847] __down_trylock_console_sem+0x3b/0xd0 [ 127.202864] vprintk_emit+0x16b/0x560 [ 127.202882] vprintk+0x84/0xa0 [ 127.202899] _printk+0xba/0xf1 [ 127.202916] ? record_print_text.cold+0x16/0x16 [ 127.202938] ? report_bug.cold+0x66/0xab [ 127.202952] ? group_sched_out.part.0+0x2c7/0x460 [ 127.202963] report_bug.cold+0x72/0xab [ 127.202978] handle_bug+0x3c/0x70 [ 127.202992] exc_invalid_op+0x14/0x50 [ 127.203006] asm_exc_invalid_op+0x16/0x20 [ 127.203023] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 127.203035] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 127.203047] RSP: 0018:ffff888017637c48 EFLAGS: 00010006 [ 127.203056] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 127.203064] RDX: ffff88803f895040 RSI: ffffffff81566027 RDI: 0000000000000005 [ 127.203072] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 127.203079] R10: 0000000000000000 R11: ffffffff865ac01b R12: ffff88800d5c2800 [ 127.203087] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 127.203098] ? group_sched_out.part.0+0x2c7/0x460 [ 127.203111] ? group_sched_out.part.0+0x2c7/0x460 [ 127.203124] ctx_sched_out+0x8f1/0xc10 [ 127.203136] __perf_event_task_sched_out+0x6d0/0x18d0 [ 127.203152] ? lock_is_held_type+0xd7/0x130 [ 127.203170] ? __perf_cgroup_move+0x160/0x160 [ 127.203181] ? set_next_entity+0x304/0x550 [ 127.203198] ? update_curr+0x267/0x740 [ 127.203217] ? lock_is_held_type+0xd7/0x130 [ 127.203235] __schedule+0xedd/0x2470 [ 127.203248] ? io_schedule_timeout+0x150/0x150 [ 127.203261] ? rcu_read_lock_sched_held+0x3e/0x80 [ 127.203281] schedule+0xda/0x1b0 [ 127.203292] exit_to_user_mode_prepare+0x114/0x1a0 [ 127.203312] syscall_exit_to_user_mode+0x19/0x40 [ 127.203330] do_syscall_64+0x48/0x90 [ 127.203344] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 127.203361] RIP: 0033:0x7f0fa8362b19 [ 127.203370] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 127.203381] RSP: 002b:00007f0fa58d8218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 127.203391] RAX: 0000000000000001 RBX: 00007f0fa8475f68 RCX: 00007f0fa8362b19 [ 127.203399] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f0fa8475f6c [ 127.203406] RBP: 00007f0fa8475f60 R08: 000000000000000e R09: 0000000000000000 [ 127.203413] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f0fa8475f6c [ 127.203421] R13: 00007ffe7544b6ff R14: 00007f0fa58d8300 R15: 0000000000022000 [ 127.203433] [ 127.257947] WARNING: CPU: 0 PID: 3931 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 127.258627] Modules linked in: [ 127.258890] CPU: 0 PID: 3931 Comm: syz-executor.1 Not tainted 6.0.0-rc5-next-20220914 #1 [ 127.259478] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 127.260288] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 127.260687] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 127.262000] RSP: 0018:ffff888017637c48 EFLAGS: 00010006 [ 127.262389] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 127.262911] RDX: ffff88803f895040 RSI: ffffffff81566027 RDI: 0000000000000005 [ 127.263434] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 127.263952] R10: 0000000000000000 R11: ffffffff865ac01b R12: ffff88800d5c2800 [ 127.264478] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 127.264997] FS: 00007f0fa58d8700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 127.265581] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 127.266006] CR2: 00007fdf66235028 CR3: 0000000017446000 CR4: 0000000000350ef0 [ 127.266529] Call Trace: [ 127.266738] [ 127.266913] ctx_sched_out+0x8f1/0xc10 [ 127.267206] __perf_event_task_sched_out+0x6d0/0x18d0 [ 127.267591] ? lock_is_held_type+0xd7/0x130 [ 127.267919] ? __perf_cgroup_move+0x160/0x160 [ 127.268254] ? set_next_entity+0x304/0x550 [ 127.268573] ? update_curr+0x267/0x740 [ 127.268869] ? lock_is_held_type+0xd7/0x130 [ 127.269199] __schedule+0xedd/0x2470 [ 127.269485] ? io_schedule_timeout+0x150/0x150 [ 127.269824] ? rcu_read_lock_sched_held+0x3e/0x80 [ 127.270190] schedule+0xda/0x1b0 [ 127.270449] exit_to_user_mode_prepare+0x114/0x1a0 [ 127.270824] syscall_exit_to_user_mode+0x19/0x40 [ 127.271179] do_syscall_64+0x48/0x90 [ 127.271460] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 127.271849] RIP: 0033:0x7f0fa8362b19 [ 127.272128] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 127.273434] RSP: 002b:00007f0fa58d8218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 127.273995] RAX: 0000000000000001 RBX: 00007f0fa8475f68 RCX: 00007f0fa8362b19 [ 127.274516] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f0fa8475f6c [ 127.275039] RBP: 00007f0fa8475f60 R08: 000000000000000e R09: 0000000000000000 [ 127.275559] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f0fa8475f6c [ 127.276072] R13: 00007ffe7544b6ff R14: 00007f0fa58d8300 R15: 0000000000022000 [ 127.276592] [ 127.276771] irq event stamp: 748 [ 127.277019] hardirqs last enabled at (747): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 127.277709] hardirqs last disabled at (748): [] __schedule+0x1225/0x2470 [ 127.278304] softirqs last enabled at (134): [] __irq_exit_rcu+0x11b/0x180 [ 127.278935] softirqs last disabled at (15): [] __irq_exit_rcu+0x11b/0x180 [ 127.279544] ---[ end trace 0000000000000000 ]--- 12:45:53 executing program 0: uname(&(0x7f0000000040)=""/149) syz_genetlink_get_family_id$team(0x0, 0xffffffffffffffff) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xa, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) 12:45:53 executing program 7: pselect6(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0) 12:45:53 executing program 3: utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x51ec3a86ad131823) 12:45:53 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x20) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), r1) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="000427bd7000ffdbdf250c0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060002003c00000014000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000008000400e90a0000080006000200000008000400000000000800040000010000"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x40104, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c6d6d61702c76657273696f6e3d3970323030302e752c756e6f059adf2c2d5c2f2f2840262d285c297d2c76657273696f6e3d3970323030302e4c2c63616368657461673d68756765746c626673002c70726976706f72742c61636365736d61636b66736861743d2e2c66b9285eea69633d3078303030303030303030303030306666662c7569643c8dc866cabdb8888a9e488038b5aaadd96b78f3c977f83c29d5", @ANYRESDEC, @ANYBLOB="2c736d61636b6673666c6f6f723d68756765746c626673002c646f6e745f6d8861737572652c736d7b636b66736861743d5e2c736d61636b66736861743d68757765746c626673002c00"]) 12:45:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) mknodat$loop(r0, &(0x7f0000000540)='./file0\x00', 0x0, 0x1) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) fchownat(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0xee01, 0x0) 12:45:53 executing program 6: keyctl$set_reqkey_keyring(0xe, 0x1) r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd=r0}, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0x0) 12:45:53 executing program 5: perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fork() ptrace$setopts(0x4206, r0, 0x0, 0x0) 12:45:53 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) sendmmsg$inet6(r0, &(0x7f0000002fc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4000001) 12:45:53 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) sendmmsg$inet6(r0, &(0x7f0000002fc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4000001) 12:45:53 executing program 3: utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x51ec3a86ad131823) 12:45:53 executing program 7: pselect6(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0) 12:45:53 executing program 6: keyctl$set_reqkey_keyring(0xe, 0x1) r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd=r0}, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0x0) 12:45:53 executing program 0: uname(&(0x7f0000000040)=""/149) syz_genetlink_get_family_id$team(0x0, 0xffffffffffffffff) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xa, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) 12:45:53 executing program 6: keyctl$set_reqkey_keyring(0xe, 0x1) r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd=r0}, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0x0) 12:45:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) mknodat$loop(r0, &(0x7f0000000540)='./file0\x00', 0x0, 0x1) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) fchownat(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0xee01, 0x0) 12:45:53 executing program 7: pselect6(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0) 12:45:53 executing program 2: keyctl$set_reqkey_keyring(0xe, 0x1) r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd=r0}, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0x0) 12:45:53 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x20) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), r1) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="000427bd7000ffdbdf250c0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060002003c00000014000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000008000400e90a0000080006000200000008000400000000000800040000010000"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x40104, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c6d6d61702c76657273696f6e3d3970323030302e752c756e6f059adf2c2d5c2f2f2840262d285c297d2c76657273696f6e3d3970323030302e4c2c63616368657461673d68756765746c626673002c70726976706f72742c61636365736d61636b66736861743d2e2c66b9285eea69633d3078303030303030303030303030306666662c7569643c8dc866cabdb8888a9e488038b5aaadd96b78f3c977f83c29d5", @ANYRESDEC, @ANYBLOB="2c736d61636b6673666c6f6f723d68756765746c626673002c646f6e745f6d8861737572652c736d7b636b66736861743d5e2c736d61636b66736861743d68757765746c626673002c00"]) 12:45:53 executing program 5: perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fork() ptrace$setopts(0x4206, r0, 0x0, 0x0) 12:45:53 executing program 3: utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x51ec3a86ad131823) [ 128.639979] hrtimer: interrupt took 18013 ns 12:45:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) mknodat$loop(r0, &(0x7f0000000540)='./file0\x00', 0x0, 0x1) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) fchownat(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0xee01, 0x0) 12:45:53 executing program 2: keyctl$set_reqkey_keyring(0xe, 0x1) r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd=r0}, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0x0) 12:45:53 executing program 6: keyctl$set_reqkey_keyring(0xe, 0x1) r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd=r0}, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0x0) 12:45:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x20) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), r1) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="000427bd7000ffdbdf250c0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060002003c00000014000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000008000400e90a0000080006000200000008000400000000000800040000010000"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x40104, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c6d6d61702c76657273696f6e3d3970323030302e752c756e6f059adf2c2d5c2f2f2840262d285c297d2c76657273696f6e3d3970323030302e4c2c63616368657461673d68756765746c626673002c70726976706f72742c61636365736d61636b66736861743d2e2c66b9285eea69633d3078303030303030303030303030306666662c7569643c8dc866cabdb8888a9e488038b5aaadd96b78f3c977f83c29d5", @ANYRESDEC, @ANYBLOB="2c736d61636b6673666c6f6f723d68756765746c626673002c646f6e745f6d8861737572652c736d7b636b66736861743d5e2c736d61636b66736861743d68757765746c626673002c00"]) 12:45:53 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x20) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), r1) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="000427bd7000ffdbdf250c0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060002003c00000014000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000008000400e90a0000080006000200000008000400000000000800040000010000"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x40104, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c6d6d61702c76657273696f6e3d3970323030302e752c756e6f059adf2c2d5c2f2f2840262d285c297d2c76657273696f6e3d3970323030302e4c2c63616368657461673d68756765746c626673002c70726976706f72742c61636365736d61636b66736861743d2e2c66b9285eea69633d3078303030303030303030303030306666662c7569643c8dc866cabdb8888a9e488038b5aaadd96b78f3c977f83c29d5", @ANYRESDEC, @ANYBLOB="2c736d61636b6673666c6f6f723d68756765746c626673002c646f6e745f6d8861737572652c736d7b636b66736861743d5e2c736d61636b66736861743d68757765746c626673002c00"]) 12:45:53 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x20) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), r1) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="000427bd7000ffdbdf250c0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060002003c00000014000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000008000400e90a0000080006000200000008000400000000000800040000010000"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x40104, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c6d6d61702c76657273696f6e3d3970323030302e752c756e6f059adf2c2d5c2f2f2840262d285c297d2c76657273696f6e3d3970323030302e4c2c63616368657461673d68756765746c626673002c70726976706f72742c61636365736d61636b66736861743d2e2c66b9285eea69633d3078303030303030303030303030306666662c7569643c8dc866cabdb8888a9e488038b5aaadd96b78f3c977f83c29d5", @ANYRESDEC, @ANYBLOB="2c736d61636b6673666c6f6f723d68756765746c626673002c646f6e745f6d8861737572652c736d7b636b66736861743d5e2c736d61636b66736861743d68757765746c626673002c00"]) 12:45:53 executing program 0: uname(&(0x7f0000000040)=""/149) syz_genetlink_get_family_id$team(0x0, 0xffffffffffffffff) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xa, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) 12:45:53 executing program 5: perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fork() ptrace$setopts(0x4206, r0, 0x0, 0x0) 12:45:53 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x20) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), r1) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="000427bd7000ffdbdf250c0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060002003c00000014000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000008000400e90a0000080006000200000008000400000000000800040000010000"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x40104, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c6d6d61702c76657273696f6e3d3970323030302e752c756e6f059adf2c2d5c2f2f2840262d285c297d2c76657273696f6e3d3970323030302e4c2c63616368657461673d68756765746c626673002c70726976706f72742c61636365736d61636b66736861743d2e2c66b9285eea69633d3078303030303030303030303030306666662c7569643c8dc866cabdb8888a9e488038b5aaadd96b78f3c977f83c29d5", @ANYRESDEC, @ANYBLOB="2c736d61636b6673666c6f6f723d68756765746c626673002c646f6e745f6d8861737572652c736d7b636b66736861743d5e2c736d61636b66736861743d68757765746c626673002c00"]) 12:45:54 executing program 2: keyctl$set_reqkey_keyring(0xe, 0x1) r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd=r0}, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0x0) 12:45:54 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x20) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), r1) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="000427bd7000ffdbdf250c0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060002003c00000014000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000008000400e90a0000080006000200000008000400000000000800040000010000"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x40104, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c6d6d61702c76657273696f6e3d3970323030302e752c756e6f059adf2c2d5c2f2f2840262d285c297d2c76657273696f6e3d3970323030302e4c2c63616368657461673d68756765746c626673002c70726976706f72742c61636365736d61636b66736861743d2e2c66b9285eea69633d3078303030303030303030303030306666662c7569643c8dc866cabdb8888a9e488038b5aaadd96b78f3c977f83c29d5", @ANYRESDEC, @ANYBLOB="2c736d61636b6673666c6f6f723d68756765746c626673002c646f6e745f6d8861737572652c736d7b636b66736861743d5e2c736d61636b66736861743d68757765746c626673002c00"]) 12:45:54 executing program 5: perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fork() ptrace$setopts(0x4206, r0, 0x0, 0x0) 12:45:54 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x20) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), r1) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="000427bd7000ffdbdf250c0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060002003c00000014000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000008000400e90a0000080006000200000008000400000000000800040000010000"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x40104, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c6d6d61702c76657273696f6e3d3970323030302e752c756e6f059adf2c2d5c2f2f2840262d285c297d2c76657273696f6e3d3970323030302e4c2c63616368657461673d68756765746c626673002c70726976706f72742c61636365736d61636b66736861743d2e2c66b9285eea69633d3078303030303030303030303030306666662c7569643c8dc866cabdb8888a9e488038b5aaadd96b78f3c977f83c29d5", @ANYRESDEC, @ANYBLOB="2c736d61636b6673666c6f6f723d68756765746c626673002c646f6e745f6d8861737572652c736d7b636b66736861743d5e2c736d61636b66736861743d68757765746c626673002c00"]) 12:45:54 executing program 6: keyctl$set_reqkey_keyring(0xe, 0x1) r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd=r0}, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0x0) 12:45:54 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x20) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), r1) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="000427bd7000ffdbdf250c0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060002003c00000014000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000008000400e90a0000080006000200000008000400000000000800040000010000"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x40104, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c6d6d61702c76657273696f6e3d3970323030302e752c756e6f059adf2c2d5c2f2f2840262d285c297d2c76657273696f6e3d3970323030302e4c2c63616368657461673d68756765746c626673002c70726976706f72742c61636365736d61636b66736861743d2e2c66b9285eea69633d3078303030303030303030303030306666662c7569643c8dc866cabdb8888a9e488038b5aaadd96b78f3c977f83c29d5", @ANYRESDEC, @ANYBLOB="2c736d61636b6673666c6f6f723d68756765746c626673002c646f6e745f6d8861737572652c736d7b636b66736861743d5e2c736d61636b66736861743d68757765746c626673002c00"]) 12:45:54 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x20) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), r1) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="000427bd7000ffdbdf250c0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060002003c00000014000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000008000400e90a0000080006000200000008000400000000000800040000010000"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x40104, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c6d6d61702c76657273696f6e3d3970323030302e752c756e6f059adf2c2d5c2f2f2840262d285c297d2c76657273696f6e3d3970323030302e4c2c63616368657461673d68756765746c626673002c70726976706f72742c61636365736d61636b66736861743d2e2c66b9285eea69633d3078303030303030303030303030306666662c7569643c8dc866cabdb8888a9e488038b5aaadd96b78f3c977f83c29d5", @ANYRESDEC, @ANYBLOB="2c736d61636b6673666c6f6f723d68756765746c626673002c646f6e745f6d8861737572652c736d7b636b66736861743d5e2c736d61636b66736861743d68757765746c626673002c00"]) 12:45:54 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x20) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), r1) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="000427bd7000ffdbdf250c0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060002003c00000014000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000008000400e90a0000080006000200000008000400000000000800040000010000"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x40104, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c6d6d61702c76657273696f6e3d3970323030302e752c756e6f059adf2c2d5c2f2f2840262d285c297d2c76657273696f6e3d3970323030302e4c2c63616368657461673d68756765746c626673002c70726976706f72742c61636365736d61636b66736861743d2e2c66b9285eea69633d3078303030303030303030303030306666662c7569643c8dc866cabdb8888a9e488038b5aaadd96b78f3c977f83c29d5", @ANYRESDEC, @ANYBLOB="2c736d61636b6673666c6f6f723d68756765746c626673002c646f6e745f6d8861737572652c736d7b636b66736861743d5e2c736d61636b66736861743d68757765746c626673002c00"]) 12:45:54 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x20) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), r1) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="000427bd7000ffdbdf250c0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060002003c00000014000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000008000400e90a0000080006000200000008000400000000000800040000010000"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x40104, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c6d6d61702c76657273696f6e3d3970323030302e752c756e6f059adf2c2d5c2f2f2840262d285c297d2c76657273696f6e3d3970323030302e4c2c63616368657461673d68756765746c626673002c70726976706f72742c61636365736d61636b66736861743d2e2c66b9285eea69633d3078303030303030303030303030306666662c7569643c8dc866cabdb8888a9e488038b5aaadd96b78f3c977f83c29d5", @ANYRESDEC, @ANYBLOB="2c736d61636b6673666c6f6f723d68756765746c626673002c646f6e745f6d8861737572652c736d7b636b66736861743d5e2c736d61636b66736861743d68757765746c626673002c00"]) 12:45:54 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x20) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), r1) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="000427bd7000ffdbdf250c0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060002003c00000014000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000008000400e90a0000080006000200000008000400000000000800040000010000"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x40104, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c6d6d61702c76657273696f6e3d3970323030302e752c756e6f059adf2c2d5c2f2f2840262d285c297d2c76657273696f6e3d3970323030302e4c2c63616368657461673d68756765746c626673002c70726976706f72742c61636365736d61636b66736861743d2e2c66b9285eea69633d3078303030303030303030303030306666662c7569643c8dc866cabdb8888a9e488038b5aaadd96b78f3c977f83c29d5", @ANYRESDEC, @ANYBLOB="2c736d61636b6673666c6f6f723d68756765746c626673002c646f6e745f6d8861737572652c736d7b636b66736861743d5e2c736d61636b66736861743d68757765746c626673002c00"]) 12:45:54 executing program 6: keyctl$set_reqkey_keyring(0xe, 0x1) r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd=r0}, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0x0) 12:45:54 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x20) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), r1) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="000427bd7000ffdbdf250c0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060002003c00000014000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000008000400e90a0000080006000200000008000400000000000800040000010000"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x40104, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c6d6d61702c76657273696f6e3d3970323030302e752c756e6f059adf2c2d5c2f2f2840262d285c297d2c76657273696f6e3d3970323030302e4c2c63616368657461673d68756765746c626673002c70726976706f72742c61636365736d61636b66736861743d2e2c66b9285eea69633d3078303030303030303030303030306666662c7569643c8dc866cabdb8888a9e488038b5aaadd96b78f3c977f83c29d5", @ANYRESDEC, @ANYBLOB="2c736d61636b6673666c6f6f723d68756765746c626673002c646f6e745f6d8861737572652c736d7b636b66736861743d5e2c736d61636b66736861743d68757765746c626673002c00"]) 12:45:55 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x20) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), r1) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="000427bd7000ffdbdf250c0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060002003c00000014000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000008000400e90a0000080006000200000008000400000000000800040000010000"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x40104, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c6d6d61702c76657273696f6e3d3970323030302e752c756e6f059adf2c2d5c2f2f2840262d285c297d2c76657273696f6e3d3970323030302e4c2c63616368657461673d68756765746c626673002c70726976706f72742c61636365736d61636b66736861743d2e2c66b9285eea69633d3078303030303030303030303030306666662c7569643c8dc866cabdb8888a9e488038b5aaadd96b78f3c977f83c29d5", @ANYRESDEC, @ANYBLOB="2c736d61636b6673666c6f6f723d68756765746c626673002c646f6e745f6d8861737572652c736d7b636b66736861743d5e2c736d61636b66736861743d68757765746c626673002c00"]) 12:45:55 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x20) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), r1) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="000427bd7000ffdbdf250c0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060002003c00000014000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000008000400e90a0000080006000200000008000400000000000800040000010000"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x40104, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c6d6d61702c76657273696f6e3d3970323030302e752c756e6f059adf2c2d5c2f2f2840262d285c297d2c76657273696f6e3d3970323030302e4c2c63616368657461673d68756765746c626673002c70726976706f72742c61636365736d61636b66736861743d2e2c66b9285eea69633d3078303030303030303030303030306666662c7569643c8dc866cabdb8888a9e488038b5aaadd96b78f3c977f83c29d5", @ANYRESDEC, @ANYBLOB="2c736d61636b6673666c6f6f723d68756765746c626673002c646f6e745f6d8861737572652c736d7b636b66736861743d5e2c736d61636b66736861743d68757765746c626673002c00"]) 12:45:55 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x20) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), r1) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="000427bd7000ffdbdf250c0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060002003c00000014000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000008000400e90a0000080006000200000008000400000000000800040000010000"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x40104, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c6d6d61702c76657273696f6e3d3970323030302e752c756e6f059adf2c2d5c2f2f2840262d285c297d2c76657273696f6e3d3970323030302e4c2c63616368657461673d68756765746c626673002c70726976706f72742c61636365736d61636b66736861743d2e2c66b9285eea69633d3078303030303030303030303030306666662c7569643c8dc866cabdb8888a9e488038b5aaadd96b78f3c977f83c29d5", @ANYRESDEC, @ANYBLOB="2c736d61636b6673666c6f6f723d68756765746c626673002c646f6e745f6d8861737572652c736d7b636b66736861743d5e2c736d61636b66736861743d68757765746c626673002c00"]) 12:45:55 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x20) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), r1) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="000427bd7000ffdbdf250c0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060002003c00000014000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000008000400e90a0000080006000200000008000400000000000800040000010000"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x40104, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c6d6d61702c76657273696f6e3d3970323030302e752c756e6f059adf2c2d5c2f2f2840262d285c297d2c76657273696f6e3d3970323030302e4c2c63616368657461673d68756765746c626673002c70726976706f72742c61636365736d61636b66736861743d2e2c66b9285eea69633d3078303030303030303030303030306666662c7569643c8dc866cabdb8888a9e488038b5aaadd96b78f3c977f83c29d5", @ANYRESDEC, @ANYBLOB="2c736d61636b6673666c6f6f723d68756765746c626673002c646f6e745f6d8861737572652c736d7b636b66736861743d5e2c736d61636b66736861743d68757765746c626673002c00"]) 12:45:55 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x20) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), r1) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="000427bd7000ffdbdf250c0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060002003c00000014000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000008000400e90a0000080006000200000008000400000000000800040000010000"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x40104, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c6d6d61702c76657273696f6e3d3970323030302e752c756e6f059adf2c2d5c2f2f2840262d285c297d2c76657273696f6e3d3970323030302e4c2c63616368657461673d68756765746c626673002c70726976706f72742c61636365736d61636b66736861743d2e2c66b9285eea69633d3078303030303030303030303030306666662c7569643c8dc866cabdb8888a9e488038b5aaadd96b78f3c977f83c29d5", @ANYRESDEC, @ANYBLOB="2c736d61636b6673666c6f6f723d68756765746c626673002c646f6e745f6d8861737572652c736d7b636b66736861743d5e2c736d61636b66736861743d68757765746c626673002c00"]) 12:45:55 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x20) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), r1) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="000427bd7000ffdbdf250c0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060002003c00000014000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000008000400e90a0000080006000200000008000400000000000800040000010000"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x40104, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c6d6d61702c76657273696f6e3d3970323030302e752c756e6f059adf2c2d5c2f2f2840262d285c297d2c76657273696f6e3d3970323030302e4c2c63616368657461673d68756765746c626673002c70726976706f72742c61636365736d61636b66736861743d2e2c66b9285eea69633d3078303030303030303030303030306666662c7569643c8dc866cabdb8888a9e488038b5aaadd96b78f3c977f83c29d5", @ANYRESDEC, @ANYBLOB="2c736d61636b6673666c6f6f723d68756765746c626673002c646f6e745f6d8861737572652c736d7b636b66736861743d5e2c736d61636b66736861743d68757765746c626673002c00"]) 12:45:55 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x20) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), r1) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="000427bd7000ffdbdf250c0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060002003c00000014000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000008000400e90a0000080006000200000008000400000000000800040000010000"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x40104, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c6d6d61702c76657273696f6e3d3970323030302e752c756e6f059adf2c2d5c2f2f2840262d285c297d2c76657273696f6e3d3970323030302e4c2c63616368657461673d68756765746c626673002c70726976706f72742c61636365736d61636b66736861743d2e2c66b9285eea69633d3078303030303030303030303030306666662c7569643c8dc866cabdb8888a9e488038b5aaadd96b78f3c977f83c29d5", @ANYRESDEC, @ANYBLOB="2c736d61636b6673666c6f6f723d68756765746c626673002c646f6e745f6d8861737572652c736d7b636b66736861743d5e2c736d61636b66736861743d68757765746c626673002c00"]) 12:45:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x7fefffa, 0x0) getpgrp(0x0) eventfd2(0x0, 0x0) close(0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r1, 0xc020662a, &(0x7f0000000340)={0x0, 0x3}) 12:45:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x7fefffa, 0x0) getpgrp(0x0) eventfd2(0x0, 0x0) close(0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r1, 0xc020662a, &(0x7f0000000340)={0x0, 0x3}) 12:45:56 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r1, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) 12:45:56 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x20) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), r1) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="000427bd7000ffdbdf250c0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060002003c00000014000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000008000400e90a0000080006000200000008000400000000000800040000010000"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x40104, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c6d6d61702c76657273696f6e3d3970323030302e752c756e6f059adf2c2d5c2f2f2840262d285c297d2c76657273696f6e3d3970323030302e4c2c63616368657461673d68756765746c626673002c70726976706f72742c61636365736d61636b66736861743d2e2c66b9285eea69633d3078303030303030303030303030306666662c7569643c8dc866cabdb8888a9e488038b5aaadd96b78f3c977f83c29d5", @ANYRESDEC, @ANYBLOB="2c736d61636b6673666c6f6f723d68756765746c626673002c646f6e745f6d8861737572652c736d7b636b66736861743d5e2c736d61636b66736861743d68757765746c626673002c00"]) 12:45:56 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x20) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), r1) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="000427bd7000ffdbdf250c0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060002003c00000014000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000008000400e90a0000080006000200000008000400000000000800040000010000"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x40104, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c6d6d61702c76657273696f6e3d3970323030302e752c756e6f059adf2c2d5c2f2f2840262d285c297d2c76657273696f6e3d3970323030302e4c2c63616368657461673d68756765746c626673002c70726976706f72742c61636365736d61636b66736861743d2e2c66b9285eea69633d3078303030303030303030303030306666662c7569643c8dc866cabdb8888a9e488038b5aaadd96b78f3c977f83c29d5", @ANYRESDEC, @ANYBLOB="2c736d61636b6673666c6f6f723d68756765746c626673002c646f6e745f6d8861737572652c736d7b636b66736861743d5e2c736d61636b66736861743d68757765746c626673002c00"]) 12:45:56 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x20040, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='devtmpfs\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0xa0000923) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/168, 0xa8}], 0x1) 12:45:56 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x20) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), r1) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="000427bd7000ffdbdf250c0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060002003c00000014000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000008000400e90a0000080006000200000008000400000000000800040000010000"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x40104, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c6d6d61702c76657273696f6e3d3970323030302e752c756e6f059adf2c2d5c2f2f2840262d285c297d2c76657273696f6e3d3970323030302e4c2c63616368657461673d68756765746c626673002c70726976706f72742c61636365736d61636b66736861743d2e2c66b9285eea69633d3078303030303030303030303030306666662c7569643c8dc866cabdb8888a9e488038b5aaadd96b78f3c977f83c29d5", @ANYRESDEC, @ANYBLOB="2c736d61636b6673666c6f6f723d68756765746c626673002c646f6e745f6d8861737572652c736d7b636b66736861743d5e2c736d61636b66736861743d68757765746c626673002c00"]) 12:45:56 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020101000470008000f801002000400003000000000000008000293fe737f153595a4b414c4c4552202046415431362020200e1fbe5b7cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a00", 0xc0}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8fffffff0ff056000ffffff09a0000bc0000de0000f000111200113400115600117800119f0ffff0f00"/96, 0x60, 0x1e0}, {&(0x7f0000010200)="f8fffffff0ff056000ffffff09a0000bc0000de0000f000111200113400115600117800119f0ffff0f00"/64, 0x40, 0x400}, {&(0x7f0000010300)="f8fffffff0ff056000ffffff09a0000bc0000de0000f000111200113400115600117800119f0ffff0f00"/64, 0x40, 0x600}, {&(0x7f0000010400)="f8fffffff0ff056000ffffff09a0000bc0000de0000f000111200113400115600117800119f0ffff0f00"/64, 0x40, 0x800}, {&(0x7f0000010500)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020100028e870325132510000e870325103000000000041660069006c00650031000f00100000ffffffffffffffffffff0000ffffffff46494c4531202020202020200028e870325132510000e870325107000a00000041660069006c00650032000f00140000ffffffffffffffffffff0000ffffffff46494c4532202020202020200028e870325132510000e870325108002823000041660069006c0065002e000f00d263006f006c0064000000ffff0000ffffffff46494c457e312020434f4c200028e870325132510000e87032511a0064000000", 0x120, 0xa00}, {&(0x7f0000010700)="2e20202020202020202020100028e870325132510000e87032510300000000002e2e202020202020202020100028e870325132510000e870325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020200028e870325132510000e870325104001a040000", 0x80, 0x1a00}, {&(0x7f0000010800)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x1c00}, {&(0x7f0000010d00)='syzkallers\x00'/32, 0x20, 0x2200}, {&(0x7f0000010e00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x4800}], 0x0, &(0x7f0000010f00)) [ 131.473413] loop2: detected capacity change from 0 to 128 [ 131.488697] audit: type=1400 audit(1663159556.549:13): avc: denied { watch_reads } for pid=4127 comm="syz-executor.3" path="/syzkaller-testdir108611826/syzkaller.ltHjST/7/file0" dev="devtmpfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir permissive=1 12:45:56 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="280000004a000104010004003ea51f000a"], 0x28}}, 0x0) [ 131.500453] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.7'. 12:45:56 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0003}]}) msync(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) 12:45:56 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="280000004a000104010004003ea51f000a"], 0x28}}, 0x0) 12:45:56 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x20040, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='devtmpfs\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0xa0000923) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/168, 0xa8}], 0x1) 12:45:56 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r1, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) 12:45:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x7fefffa, 0x0) getpgrp(0x0) eventfd2(0x0, 0x0) close(0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r1, 0xc020662a, &(0x7f0000000340)={0x0, 0x3}) [ 131.619649] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.7'. 12:45:56 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0003}]}) msync(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) 12:45:56 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="280000004a000104010004003ea51f000a"], 0x28}}, 0x0) 12:45:56 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x20040, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='devtmpfs\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0xa0000923) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/168, 0xa8}], 0x1) [ 131.728380] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.7'. 12:45:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x7fefffa, 0x0) getpgrp(0x0) eventfd2(0x0, 0x0) close(0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r1, 0xc020662a, &(0x7f0000000340)={0x0, 0x3}) 12:45:56 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="280000004a000104010004003ea51f000a"], 0x28}}, 0x0) [ 131.841850] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.7'. 12:45:57 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x20040, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='devtmpfs\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0xa0000923) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/168, 0xa8}], 0x1) 12:45:57 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r1, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) 12:45:57 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2c, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000040000004600000000000000", 0x40, 0x540}, {&(0x7f0000010300)="0300000004000000000000000000000000000000010400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000010500)="ff030000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d3f4655fd3f4655fd3f4655f00"/4128, 0x1020, 0x1000}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f00000000000004004000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x2100}, {&(0x7f0000011700)="20000000945343359453433500000000d3f4655f00"/32, 0x20, 0x2180}, {&(0x7f0000011800)="8081000000180000d3f4655fd3f4655fd3f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000030000000", 0x40, 0x2200}, {&(0x7f0000011900)="20000000000000000000000000000000d3f4655f00"/32, 0x20, 0x2280}, {&(0x7f0000011a00)="8081000000180000d3f4655fd3f4655fd3f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040000000", 0x40, 0x2300}, {&(0x7f0000011b00)="20000000000000000000000000000000d3f4655f00"/32, 0x20, 0x2380}, {&(0x7f0000011c00)="c041000000400000d3f4655fd3f4655fd3f4655f00000000000002004000000000000800000000000af301000400000000000000000000000800000020000000", 0x40, 0x2a00}, {&(0x7f0000011d00)="20000000000000000000000000000000d3f4655f00"/32, 0x20, 0x2a80}, {&(0x7f0000011e00)="ed41000000080000d4f4655fd4f4655fd4f4655f00000000000002004000000000000800030000000af301000400000000000000000000000100000050000000000000000000000000000000000000000000000000000000000000000000000000000000d6b05c9300000000000000000000000000000000000000000000000020000000945343359453433594534335d4f4655f945343350000000000000000", 0xa0, 0x2b00}, {&(0x7f0000011f00)="ed8100001a040000d4f4655fd4f4655fd4f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000600000000000000000000000000000000000000000000000000000000000000000000000000000000da710e000000000000000000000000000000000000000000000000020000000945343359453433594534335d4f4655f945343350000000000000000", 0xa0, 0x2c00}, {&(0x7f0000012000)="ffa1000026000000d4f4655fd4f4655fd4f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3230323230373937342f66696c65302f66696c653000000000000000000000000000000000000000000000d6e8afef00000000000000000000000000000000000000000000000020000000945343359453433594534335d4f4655f945343350000000000000000", 0xa0, 0x2d00}, {&(0x7f0000012100)="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", 0x1a0, 0x2e00}, {&(0x7f0000012300)="ed81000064000000d4f4655fd4f4655fd4f4655f00000000000001004000000000000800010000000af301000400000000000000000000000100000090000000000000000000000000000000000000000000000000000000000000000000000000000000d9d9ad0100000000000000000000000000000000000000000000000020000000945343359453433594534335d4f4655f945343350000000000000000", 0xa0, 0x3000}, {&(0x7f0000012400)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x80, 0x8000}, {&(0x7f0000012500)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x10000}, {&(0x7f0000012600)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x10800}, {&(0x7f0000012700)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x11000}, {&(0x7f0000012800)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x11800}, {&(0x7f0000012900)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x12000}, {&(0x7f0000012a00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x12800}, {&(0x7f0000012b00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x13000}, {&(0x7f0000012c00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x13800}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x18000}, {&(0x7f0000012e00)="0200"/32, 0x20, 0x18400}, {&(0x7f0000012f00)="0300"/32, 0x20, 0x18800}, {&(0x7f0000013000)="0400"/32, 0x20, 0x18c00}, {&(0x7f0000013100)="0500"/32, 0x20, 0x19000}, {&(0x7f0000013200)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000800300"/96, 0x60, 0x19400}, {&(0x7f0000013300)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x20000}, {&(0x7f0000013400)="0200"/32, 0x20, 0x20400}, {&(0x7f0000013500)="0300"/32, 0x20, 0x20800}, {&(0x7f0000013600)="0400"/32, 0x20, 0x20c00}, {&(0x7f0000013700)="0500"/32, 0x20, 0x21000}, {&(0x7f0000013800)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000800300"/96, 0x60, 0x21400}, {&(0x7f0000013900)="0c0000000c0001022e000000020000000c0002022e2e00000d0000001000050166696c65300000000e000000d807050766696c653100"/64, 0x40, 0x28000}, {&(0x7f0000013a00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x30000}, {&(0x7f0000013f00)='syzkallers\x00'/32, 0x20, 0x38000}, {&(0x7f0000014000)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x48000}], 0x0, &(0x7f0000014100)) 12:45:57 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000500)={[{@name={'name', 0x3d, 'context'}}, {@name={'name', 0x3d, 'system_u'}}]}) 12:45:57 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r1, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) 12:45:57 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0003}]}) msync(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) [ 132.085741] loop7: detected capacity change from 0 to 2048 [ 132.094219] cgroup: name respecified 12:45:57 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000500)={[{@name={'name', 0x3d, 'context'}}, {@name={'name', 0x3d, 'system_u'}}]}) [ 132.151681] EXT4-fs (loop7): mounted filesystem without journal. Quota mode: writeback. 12:45:57 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0003}]}) msync(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) 12:45:57 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r1, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) [ 132.232990] cgroup: name respecified [ 132.237094] EXT4-fs (loop7): unmounting filesystem. 12:45:57 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r1, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) 12:45:57 executing program 6: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000900), 0x0, 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, 0x0, 0x0, 0xffffffffffffffff) 12:45:57 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2c, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000040000004600000000000000", 0x40, 0x540}, {&(0x7f0000010300)="0300000004000000000000000000000000000000010400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000010500)="ff030000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d3f4655fd3f4655fd3f4655f00"/4128, 0x1020, 0x1000}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f00000000000004004000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x2100}, {&(0x7f0000011700)="20000000945343359453433500000000d3f4655f00"/32, 0x20, 0x2180}, {&(0x7f0000011800)="8081000000180000d3f4655fd3f4655fd3f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000030000000", 0x40, 0x2200}, {&(0x7f0000011900)="20000000000000000000000000000000d3f4655f00"/32, 0x20, 0x2280}, {&(0x7f0000011a00)="8081000000180000d3f4655fd3f4655fd3f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040000000", 0x40, 0x2300}, {&(0x7f0000011b00)="20000000000000000000000000000000d3f4655f00"/32, 0x20, 0x2380}, {&(0x7f0000011c00)="c041000000400000d3f4655fd3f4655fd3f4655f00000000000002004000000000000800000000000af301000400000000000000000000000800000020000000", 0x40, 0x2a00}, {&(0x7f0000011d00)="20000000000000000000000000000000d3f4655f00"/32, 0x20, 0x2a80}, {&(0x7f0000011e00)="ed41000000080000d4f4655fd4f4655fd4f4655f00000000000002004000000000000800030000000af301000400000000000000000000000100000050000000000000000000000000000000000000000000000000000000000000000000000000000000d6b05c9300000000000000000000000000000000000000000000000020000000945343359453433594534335d4f4655f945343350000000000000000", 0xa0, 0x2b00}, {&(0x7f0000011f00)="ed8100001a040000d4f4655fd4f4655fd4f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000600000000000000000000000000000000000000000000000000000000000000000000000000000000da710e000000000000000000000000000000000000000000000000020000000945343359453433594534335d4f4655f945343350000000000000000", 0xa0, 0x2c00}, {&(0x7f0000012000)="ffa1000026000000d4f4655fd4f4655fd4f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3230323230373937342f66696c65302f66696c653000000000000000000000000000000000000000000000d6e8afef00000000000000000000000000000000000000000000000020000000945343359453433594534335d4f4655f945343350000000000000000", 0xa0, 0x2d00}, {&(0x7f0000012100)="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", 0x1a0, 0x2e00}, {&(0x7f0000012300)="ed81000064000000d4f4655fd4f4655fd4f4655f00000000000001004000000000000800010000000af301000400000000000000000000000100000090000000000000000000000000000000000000000000000000000000000000000000000000000000d9d9ad0100000000000000000000000000000000000000000000000020000000945343359453433594534335d4f4655f945343350000000000000000", 0xa0, 0x3000}, {&(0x7f0000012400)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x80, 0x8000}, {&(0x7f0000012500)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x10000}, {&(0x7f0000012600)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x10800}, {&(0x7f0000012700)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x11000}, {&(0x7f0000012800)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x11800}, {&(0x7f0000012900)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x12000}, {&(0x7f0000012a00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x12800}, {&(0x7f0000012b00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x13000}, {&(0x7f0000012c00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x13800}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x18000}, {&(0x7f0000012e00)="0200"/32, 0x20, 0x18400}, {&(0x7f0000012f00)="0300"/32, 0x20, 0x18800}, {&(0x7f0000013000)="0400"/32, 0x20, 0x18c00}, {&(0x7f0000013100)="0500"/32, 0x20, 0x19000}, {&(0x7f0000013200)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000800300"/96, 0x60, 0x19400}, {&(0x7f0000013300)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x20000}, {&(0x7f0000013400)="0200"/32, 0x20, 0x20400}, {&(0x7f0000013500)="0300"/32, 0x20, 0x20800}, {&(0x7f0000013600)="0400"/32, 0x20, 0x20c00}, {&(0x7f0000013700)="0500"/32, 0x20, 0x21000}, {&(0x7f0000013800)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000800300"/96, 0x60, 0x21400}, {&(0x7f0000013900)="0c0000000c0001022e000000020000000c0002022e2e00000d0000001000050166696c65300000000e000000d807050766696c653100"/64, 0x40, 0x28000}, {&(0x7f0000013a00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x30000}, {&(0x7f0000013f00)='syzkallers\x00'/32, 0x20, 0x38000}, {&(0x7f0000014000)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x48000}], 0x0, &(0x7f0000014100)) 12:45:57 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000200)=""/19, 0x13) 12:45:57 executing program 2: mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r2 = openat2(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) syz_io_uring_submit(0x0, 0x0, &(0x7f00000003c0)=@IORING_OP_WRITE={0x17, 0x1, 0x4007, @fd_index=0x2, 0x2, &(0x7f0000000340)="1a9c9aaba3133e4d461f263a04449aced2c50aa7e6f14e393752eb4babd6ce252ef62dfcf0d9608d4f3084f43ba9084b5eb7a00d76d147427169f6f806e7be70d662be17a8c51ea55124831b2ba52a90f3", 0x51, 0x4, 0x1}, 0xc8c) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r3) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) ioctl$SNAPSHOT_FREE(r4, 0x3305) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x81, 0x90, 0x6, 0xc7, 0x0, 0x80000ffe, 0x1, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x539, 0x2, @perf_bp={&(0x7f0000000100), 0xc}, 0x8, 0x2, 0x829c, 0x2, 0xcf4b, 0x2, 0xfffa, 0x0, 0x5, 0x0, 0x28e5}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x3) 12:45:57 executing program 6: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000900), 0x0, 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, 0x0, 0x0, 0xffffffffffffffff) 12:45:57 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2, r2}) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000101000018000000b85c858c9d8084f484d82a59f6aeb2153419277f798bb1ff8623b0e542c39f46839f262adba2724a9588a816c69a584896c9d529e58fa9e6da0b8a08730a89f71b4dd784ab6be8feed5568a502f8d58d03b1fca2a903377564a9b31cac186ec650803998ceda1df7939af8c59409875c51263cfe2f1b446ec8ded2b0d4f6d57f8f8eedcb0dee4b8ddfe59d4df0c9f8e49002035104dba171d91c2e000000da0fe8c0ef82ba657c45ee64cd104d480b40a8d13ad95e13c203ca6767bfb7a1ca5a03fda2a953999eeb4de76d35062fb11fca027648aa93308c77073c51a66b14102d0c449095e0e29b617ae0e3e3afe3728a72ffe8be650825188e97c454e2aae097fe86c810c011f672dbd5a2e89ff526fc12e033e6655aeaa72ac713a09eb2b2581c8af5eb5cd VM DIAGNOSIS: 12:45:52 Registers: info registers vcpu 0 RAX=0000000000000030 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b24f1 RDI=ffffffff87641b60 RBP=ffffffff87641b20 RSP=ffff888017637698 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000030 R11=0000000000000001 R12=0000000000000030 R13=ffffffff87641b20 R14=0000000000000010 R15=ffffffff822b24e0 RIP=ffffffff822b2549 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f0fa58d8700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fdf66235028 CR3=0000000017446000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f0fa84497c0 00007f0fa84497c8 YMM02=0000000000000000 0000000000000000 00007f0fa84497e0 00007f0fa84497c0 YMM03=0000000000000000 0000000000000000 00007f0fa84497c8 00007f0fa84497c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=ffff88800fcf1ac0 RCX=ffffffff811da5bc RDX=ffff88800fcf1ac0 RSI=0000000000000000 RDI=0000000000000005 RBP=0000000000200000 RSP=ffff88800fd7fd88 R8 =0000000000000005 R9 =0000000000000000 R10=0000000000200000 R11=0000000000000001 R12=ffff88807934aff9 R13=ffff88800fcf1ac0 R14=0000000000000000 R15=0000000000000092 RIP=ffffffff81461325 RFL=00000093 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f7190be0260 CR3=00000000184a8000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM02=0000000000000000 0000000000000000 00524f5252450040 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 0000000000000000 00000000000000ff YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000