Warning: Permanently added '[localhost]:62919' (ECDSA) to the list of known hosts. 2022/09/23 11:39:36 fuzzer started 2022/09/23 11:39:36 dialing manager at localhost:38881 2022/09/23 11:39:36 checking machine... 2022/09/23 11:39:36 checking revisions... syzkaller login: [ 44.082507] kmemleak: Automatic memory scanning thread ended 2022/09/23 11:39:36 testing simple program... [ 44.161249] cgroup: Unknown subsys name 'net' [ 44.240819] cgroup: Unknown subsys name 'rlimit' executing program executing program executing program executing program executing program [ 59.304013] audit: type=1400 audit(1663933191.977:6): avc: denied { execmem } for pid=288 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 60.427017] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 60.428832] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 60.432209] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 60.436773] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 60.438532] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 60.440546] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 60.447868] Bluetooth: hci0: HCI_REQ-0x0c1a executing program [ 62.454281] Bluetooth: hci0: command 0x0409 tx timeout [ 64.502263] Bluetooth: hci0: command 0x041b tx timeout executing program [ 66.549765] Bluetooth: hci0: command 0x040f tx timeout executing program [ 68.597771] Bluetooth: hci0: command 0x0419 tx timeout executing program executing program executing program executing program 2022/09/23 11:40:14 building call list... executing program [ 84.296297] audit: type=1400 audit(1663933216.969:7): avc: denied { create } for pid=267 comm="syz-fuzzer" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 executing program 2022/09/23 11:40:20 syscalls: 2215 2022/09/23 11:40:20 code coverage: enabled 2022/09/23 11:40:20 comparison tracing: enabled 2022/09/23 11:40:20 extra coverage: enabled 2022/09/23 11:40:20 setuid sandbox: enabled 2022/09/23 11:40:20 namespace sandbox: enabled 2022/09/23 11:40:20 Android sandbox: enabled 2022/09/23 11:40:20 fault injection: enabled 2022/09/23 11:40:20 leak checking: enabled 2022/09/23 11:40:20 net packet injection: enabled 2022/09/23 11:40:20 net device setup: enabled 2022/09/23 11:40:20 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/23 11:40:20 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/23 11:40:20 USB emulation: enabled 2022/09/23 11:40:20 hci packet injection: enabled 2022/09/23 11:40:20 wifi device emulation: failed to parse kernel version (6.0.0-rc6-next-20220923) 2022/09/23 11:40:20 802.15.4 emulation: enabled 2022/09/23 11:40:20 fetching corpus: 0, signal 0/0 (executing program) 2022/09/23 11:40:20 fetching corpus: 0, signal 0/0 (executing program) 2022/09/23 11:40:22 starting 8 fuzzer processes 11:40:22 executing program 0: futex(0x0, 0x5, 0x0, &(0x7f0000000180), 0x0, 0x0) 11:40:22 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 11:40:22 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xc5}, 0xf) 11:40:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="580000000001010400000000000000000a000000440001802c000180140003002001000000000000000000000000000014000400ff0200000000000000000000000000010c000280040001"], 0x58}}, 0x0) 11:40:22 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080), 0x6) write$bt_hci(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="03"], 0x7) 11:40:22 executing program 5: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000cc0)={0x2}, 0x8, 0x0) 11:40:22 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCGSOFTCAR(r0, 0x5423, &(0x7f0000000040)) 11:40:22 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0x47, 0x0, 0x0, 0x0, 0x0, "ce397fb01034ede6a83d9a69b41b2d8b21772f"}) [ 91.409244] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 91.412942] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 91.414264] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 91.416173] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 91.417797] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 91.418809] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 91.420090] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 91.421264] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 91.422308] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 91.427157] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 91.428467] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 91.429815] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 91.434251] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 91.436100] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 91.437613] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 91.438990] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 91.440177] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 91.441506] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 91.456394] Bluetooth: hci0: HCI_REQ-0x0c1a [ 91.469829] Bluetooth: hci1: HCI_REQ-0x0c1a [ 91.470477] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 91.472019] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 91.473962] Bluetooth: hci2: HCI_REQ-0x0c1a [ 91.508178] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 91.508377] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 91.510857] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 91.512114] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 91.513926] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 91.515977] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 91.517899] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 91.519520] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 91.521261] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 91.523076] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 91.524369] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 91.525037] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 91.526435] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 91.527760] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 91.531457] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 91.532061] Bluetooth: hci6: HCI_REQ-0x0c1a [ 91.532966] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 91.534942] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 91.536113] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 91.537492] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 91.541030] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 91.541053] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 91.546406] Bluetooth: hci5: HCI_REQ-0x0c1a [ 91.549892] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 91.572414] Bluetooth: hci7: HCI_REQ-0x0c1a [ 91.573242] Bluetooth: hci4: HCI_REQ-0x0c1a [ 93.493724] Bluetooth: hci1: command 0x0409 tx timeout [ 93.493781] Bluetooth: hci2: command 0x0409 tx timeout [ 93.494765] Bluetooth: hci0: command 0x0409 tx timeout [ 93.495738] Bluetooth: hci3: Opcode 0x c03 failed: -110 [ 93.557920] Bluetooth: hci6: command 0x0409 tx timeout [ 93.558438] Bluetooth: hci5: command 0x0409 tx timeout [ 93.621704] Bluetooth: hci4: command 0x0409 tx timeout [ 93.622221] Bluetooth: hci7: command 0x0409 tx timeout [ 95.541729] Bluetooth: hci0: command 0x041b tx timeout [ 95.542190] Bluetooth: hci2: command 0x041b tx timeout [ 95.542589] Bluetooth: hci1: command 0x041b tx timeout [ 95.606691] Bluetooth: hci5: command 0x041b tx timeout [ 95.607119] Bluetooth: hci6: command 0x041b tx timeout [ 95.669820] Bluetooth: hci7: command 0x041b tx timeout [ 95.670250] Bluetooth: hci4: command 0x041b tx timeout [ 97.590707] Bluetooth: hci1: command 0x040f tx timeout [ 97.590939] Bluetooth: hci2: command 0x040f tx timeout [ 97.591160] Bluetooth: hci0: command 0x040f tx timeout [ 97.654749] Bluetooth: hci6: command 0x040f tx timeout [ 97.654789] Bluetooth: hci5: command 0x040f tx timeout [ 97.718780] Bluetooth: hci4: command 0x040f tx timeout [ 97.719542] Bluetooth: hci7: command 0x040f tx timeout [ 98.102693] Bluetooth: hci3: Opcode 0x c03 failed: -110 [ 99.637682] Bluetooth: hci0: command 0x0419 tx timeout [ 99.637725] Bluetooth: hci2: command 0x0419 tx timeout [ 99.638163] Bluetooth: hci1: command 0x0419 tx timeout [ 99.701696] Bluetooth: hci5: command 0x0419 tx timeout [ 99.702744] Bluetooth: hci6: command 0x0419 tx timeout [ 99.765733] Bluetooth: hci7: command 0x0419 tx timeout [ 99.765762] Bluetooth: hci4: command 0x0419 tx timeout [ 100.600318] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 100.601468] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 100.602612] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 100.604292] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 100.605438] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 100.606458] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 100.609187] Bluetooth: hci3: HCI_REQ-0x0c1a [ 102.645805] Bluetooth: hci3: command 0x0409 tx timeout [ 104.693716] Bluetooth: hci3: command 0x041b tx timeout [ 106.741731] Bluetooth: hci3: command 0x040f tx timeout [ 108.789684] Bluetooth: hci3: command 0x0419 tx timeout 11:41:14 executing program 5: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000cc0)={0x2}, 0x8, 0x0) 11:41:14 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 11:41:14 executing program 5: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000cc0)={0x2}, 0x8, 0x0) 11:41:14 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 11:41:15 executing program 5: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000cc0)={0x2}, 0x8, 0x0) 11:41:15 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 11:41:15 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 11:41:15 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) [ 143.104513] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 143.105994] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 144.215070] audit: type=1400 audit(1663933276.888:8): avc: denied { open } for pid=4450 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 144.216715] audit: type=1400 audit(1663933276.888:9): avc: denied { kernel } for pid=4450 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 144.228793] ------------[ cut here ]------------ [ 144.228820] [ 144.228824] ====================================================== [ 144.228829] WARNING: possible circular locking dependency detected [ 144.228837] 6.0.0-rc6-next-20220923 #1 Not tainted [ 144.228845] ------------------------------------------------------ [ 144.228849] syz-executor.3/4451 is trying to acquire lock: [ 144.228857] ffffffff853faaf8 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 144.228903] [ 144.228903] but task is already holding lock: [ 144.228906] ffff88800edb4020 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 144.228942] [ 144.228942] which lock already depends on the new lock. [ 144.228942] [ 144.228945] [ 144.228945] the existing dependency chain (in reverse order) is: [ 144.228950] [ 144.228950] -> #3 (&ctx->lock){....}-{2:2}: [ 144.228967] _raw_spin_lock+0x2a/0x40 [ 144.228991] __perf_event_task_sched_out+0x53b/0x18d0 [ 144.229007] __schedule+0xedd/0x2470 [ 144.229024] schedule+0xda/0x1b0 [ 144.229041] futex_wait_queue+0xf5/0x1e0 [ 144.229055] futex_wait+0x28e/0x690 [ 144.229068] do_futex+0x2ff/0x380 [ 144.229080] __x64_sys_futex+0x1c6/0x4d0 [ 144.229092] do_syscall_64+0x3b/0x90 [ 144.229114] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 144.229129] [ 144.229129] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 144.229147] _raw_spin_lock_nested+0x30/0x40 [ 144.229170] raw_spin_rq_lock_nested+0x1e/0x30 [ 144.229186] task_fork_fair+0x63/0x4d0 [ 144.229206] sched_cgroup_fork+0x3d0/0x540 [ 144.229224] copy_process+0x4183/0x6e20 [ 144.229237] kernel_clone+0xe7/0x890 [ 144.229249] user_mode_thread+0xad/0xf0 [ 144.229262] rest_init+0x24/0x250 [ 144.229276] arch_call_rest_init+0xf/0x14 [ 144.229298] start_kernel+0x4c1/0x4e6 [ 144.229317] secondary_startup_64_no_verify+0xe0/0xeb [ 144.229335] [ 144.229335] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 144.229352] _raw_spin_lock_irqsave+0x39/0x60 [ 144.229375] try_to_wake_up+0xab/0x1930 [ 144.229392] up+0x75/0xb0 [ 144.229409] __up_console_sem+0x6e/0x80 [ 144.229449] console_unlock+0x46a/0x590 [ 144.229469] vprintk_emit+0x1bd/0x560 [ 144.229489] vprintk+0x84/0xa0 [ 144.229509] _printk+0xba/0xf1 [ 144.229523] kauditd_hold_skb.cold+0x3f/0x4e [ 144.229544] kauditd_send_queue+0x233/0x290 [ 144.229563] kauditd_thread+0x5da/0x9a0 [ 144.229580] kthread+0x2ed/0x3a0 [ 144.229598] ret_from_fork+0x22/0x30 [ 144.229613] [ 144.229613] -> #0 ((console_sem).lock){....}-{2:2}: [ 144.229631] __lock_acquire+0x2a02/0x5e70 [ 144.229652] lock_acquire+0x1a2/0x530 [ 144.229672] _raw_spin_lock_irqsave+0x39/0x60 [ 144.229695] down_trylock+0xe/0x70 [ 144.229714] __down_trylock_console_sem+0x3b/0xd0 [ 144.229734] vprintk_emit+0x16b/0x560 [ 144.229754] vprintk+0x84/0xa0 [ 144.229774] _printk+0xba/0xf1 [ 144.229787] report_bug.cold+0x72/0xab [ 144.229807] handle_bug+0x3c/0x70 [ 144.229827] exc_invalid_op+0x14/0x50 [ 144.229848] asm_exc_invalid_op+0x16/0x20 [ 144.229863] group_sched_out.part.0+0x2c7/0x460 [ 144.229877] ctx_sched_out+0x8f1/0xc10 [ 144.229889] __perf_event_task_sched_out+0x6d0/0x18d0 [ 144.229905] __schedule+0xedd/0x2470 [ 144.229922] schedule+0xda/0x1b0 [ 144.229938] futex_wait_queue+0xf5/0x1e0 [ 144.229952] futex_wait+0x28e/0x690 [ 144.229964] do_futex+0x2ff/0x380 [ 144.229976] __x64_sys_futex+0x1c6/0x4d0 [ 144.229989] do_syscall_64+0x3b/0x90 [ 144.230009] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 144.230025] [ 144.230025] other info that might help us debug this: [ 144.230025] [ 144.230028] Chain exists of: [ 144.230028] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 144.230028] [ 144.230047] Possible unsafe locking scenario: [ 144.230047] [ 144.230050] CPU0 CPU1 [ 144.230053] ---- ---- [ 144.230056] lock(&ctx->lock); [ 144.230063] lock(&rq->__lock); [ 144.230071] lock(&ctx->lock); [ 144.230079] lock((console_sem).lock); [ 144.230086] [ 144.230086] *** DEADLOCK *** [ 144.230086] [ 144.230088] 2 locks held by syz-executor.3/4451: [ 144.230097] #0: ffff88806cf37d18 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 144.230134] #1: ffff88800edb4020 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 144.230169] [ 144.230169] stack backtrace: [ 144.230173] CPU: 1 PID: 4451 Comm: syz-executor.3 Not tainted 6.0.0-rc6-next-20220923 #1 [ 144.230189] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 144.230199] Call Trace: [ 144.230203] [ 144.230209] dump_stack_lvl+0x8b/0xb3 [ 144.230232] check_noncircular+0x263/0x2e0 [ 144.230253] ? format_decode+0x26c/0xb50 [ 144.230274] ? print_circular_bug+0x450/0x450 [ 144.230296] ? enable_ptr_key_workfn+0x20/0x20 [ 144.230317] ? format_decode+0x26c/0xb50 [ 144.230340] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 144.230363] __lock_acquire+0x2a02/0x5e70 [ 144.230393] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 144.230416] ? __mutex_add_waiter+0x120/0x120 [ 144.230441] lock_acquire+0x1a2/0x530 [ 144.230462] ? down_trylock+0xe/0x70 [ 144.230484] ? lock_release+0x750/0x750 [ 144.230512] ? vprintk+0x84/0xa0 [ 144.230536] _raw_spin_lock_irqsave+0x39/0x60 [ 144.230560] ? down_trylock+0xe/0x70 [ 144.230580] down_trylock+0xe/0x70 [ 144.230600] ? vprintk+0x84/0xa0 [ 144.230621] __down_trylock_console_sem+0x3b/0xd0 [ 144.230644] vprintk_emit+0x16b/0x560 [ 144.230669] vprintk+0x84/0xa0 [ 144.230691] _printk+0xba/0xf1 [ 144.230706] ? record_print_text.cold+0x16/0x16 [ 144.230727] ? report_bug.cold+0x66/0xab [ 144.230750] ? group_sched_out.part.0+0x2c7/0x460 [ 144.230765] report_bug.cold+0x72/0xab [ 144.230790] handle_bug+0x3c/0x70 [ 144.230812] exc_invalid_op+0x14/0x50 [ 144.230835] asm_exc_invalid_op+0x16/0x20 [ 144.230850] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 144.230867] Code: 5e 41 5f e9 5b bb ef ff e8 56 bb ef ff 65 8b 1d 1b 26 ac 7e 31 ff 89 de e8 f6 b7 ef ff 85 db 0f 84 8a 00 00 00 e8 39 bb ef ff <0f> 0b e9 a5 fe ff ff e8 2d bb ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 144.230882] RSP: 0018:ffff88803a2078f8 EFLAGS: 00010006 [ 144.230893] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 144.230903] RDX: ffff8880185c5040 RSI: ffffffff81564fb7 RDI: 0000000000000005 [ 144.230913] RBP: ffff888038058000 R08: 0000000000000005 R09: 0000000000000001 [ 144.230922] R10: 0000000000000000 R11: ffffffff865b005b R12: ffff88800edb4000 [ 144.230932] R13: ffff88806cf3d140 R14: ffffffff8547d040 R15: 0000000000000002 [ 144.230947] ? group_sched_out.part.0+0x2c7/0x460 [ 144.230965] ? group_sched_out.part.0+0x2c7/0x460 [ 144.230983] ctx_sched_out+0x8f1/0xc10 [ 144.231001] __perf_event_task_sched_out+0x6d0/0x18d0 [ 144.231022] ? lock_is_held_type+0xd7/0x130 [ 144.231040] ? __perf_cgroup_move+0x160/0x160 [ 144.231055] ? set_next_entity+0x304/0x550 [ 144.231081] ? lock_is_held_type+0xd7/0x130 [ 144.231100] __schedule+0xedd/0x2470 [ 144.231122] ? io_schedule_timeout+0x150/0x150 [ 144.231141] ? futex_wait_setup+0x166/0x230 [ 144.231162] schedule+0xda/0x1b0 [ 144.231180] futex_wait_queue+0xf5/0x1e0 [ 144.231197] futex_wait+0x28e/0x690 [ 144.231213] ? futex_wait_setup+0x230/0x230 [ 144.231231] ? wake_up_q+0x8b/0xf0 [ 144.231248] ? do_raw_spin_unlock+0x4f/0x220 [ 144.231273] ? futex_wake+0x158/0x490 [ 144.231296] ? fd_install+0x1f9/0x640 [ 144.231318] do_futex+0x2ff/0x380 [ 144.231333] ? __ia32_compat_sys_get_robust_list+0x3b0/0x3b0 [ 144.231355] __x64_sys_futex+0x1c6/0x4d0 [ 144.231373] ? __x64_sys_futex_time32+0x480/0x480 [ 144.231390] ? syscall_enter_from_user_mode+0x1d/0x50 [ 144.231407] ? syscall_enter_from_user_mode+0x1d/0x50 [ 144.231428] do_syscall_64+0x3b/0x90 [ 144.231450] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 144.231467] RIP: 0033:0x7fb1e3e8eb19 [ 144.231477] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 144.231491] RSP: 002b:00007fb1e1404218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 144.231505] RAX: ffffffffffffffda RBX: 00007fb1e3fa1f68 RCX: 00007fb1e3e8eb19 [ 144.231515] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fb1e3fa1f68 [ 144.231524] RBP: 00007fb1e3fa1f60 R08: 0000000000000000 R09: 0000000000000000 [ 144.231534] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb1e3fa1f6c [ 144.231543] R13: 00007ffd8a0a1bbf R14: 00007fb1e1404300 R15: 0000000000022000 [ 144.231562] [ 144.312059] WARNING: CPU: 1 PID: 4451 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 144.312822] Modules linked in: [ 144.313099] CPU: 1 PID: 4451 Comm: syz-executor.3 Not tainted 6.0.0-rc6-next-20220923 #1 [ 144.313778] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 144.314692] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 144.315152] Code: 5e 41 5f e9 5b bb ef ff e8 56 bb ef ff 65 8b 1d 1b 26 ac 7e 31 ff 89 de e8 f6 b7 ef ff 85 db 0f 84 8a 00 00 00 e8 39 bb ef ff <0f> 0b e9 a5 fe ff ff e8 2d bb ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 144.316626] RSP: 0018:ffff88803a2078f8 EFLAGS: 00010006 [ 144.317072] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 144.317671] RDX: ffff8880185c5040 RSI: ffffffff81564fb7 RDI: 0000000000000005 [ 144.318263] RBP: ffff888038058000 R08: 0000000000000005 R09: 0000000000000001 [ 144.318847] R10: 0000000000000000 R11: ffffffff865b005b R12: ffff88800edb4000 [ 144.319437] R13: ffff88806cf3d140 R14: ffffffff8547d040 R15: 0000000000000002 [ 144.320022] FS: 00007fb1e1404700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 144.320689] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 144.321175] CR2: 00007fdb60a7db90 CR3: 00000000382d2000 CR4: 0000000000350ee0 [ 144.321773] Call Trace: [ 144.321993] [ 144.322194] ctx_sched_out+0x8f1/0xc10 [ 144.322527] __perf_event_task_sched_out+0x6d0/0x18d0 [ 144.322967] ? lock_is_held_type+0xd7/0x130 [ 144.323331] ? __perf_cgroup_move+0x160/0x160 [ 144.323714] ? set_next_entity+0x304/0x550 [ 144.324085] ? lock_is_held_type+0xd7/0x130 [ 144.324451] __schedule+0xedd/0x2470 [ 144.324780] ? io_schedule_timeout+0x150/0x150 [ 144.325173] ? futex_wait_setup+0x166/0x230 [ 144.325557] schedule+0xda/0x1b0 [ 144.325856] futex_wait_queue+0xf5/0x1e0 [ 144.326197] futex_wait+0x28e/0x690 [ 144.326509] ? futex_wait_setup+0x230/0x230 [ 144.326873] ? wake_up_q+0x8b/0xf0 [ 144.327182] ? do_raw_spin_unlock+0x4f/0x220 [ 144.327566] ? futex_wake+0x158/0x490 [ 144.327899] ? fd_install+0x1f9/0x640 [ 144.328226] do_futex+0x2ff/0x380 [ 144.328525] ? __ia32_compat_sys_get_robust_list+0x3b0/0x3b0 [ 144.329005] __x64_sys_futex+0x1c6/0x4d0 [ 144.329349] ? __x64_sys_futex_time32+0x480/0x480 [ 144.329770] ? syscall_enter_from_user_mode+0x1d/0x50 [ 144.330197] ? syscall_enter_from_user_mode+0x1d/0x50 [ 144.330627] do_syscall_64+0x3b/0x90 [ 144.330952] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 144.331382] RIP: 0033:0x7fb1e3e8eb19 [ 144.331695] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 144.333164] RSP: 002b:00007fb1e1404218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 144.333793] RAX: ffffffffffffffda RBX: 00007fb1e3fa1f68 RCX: 00007fb1e3e8eb19 [ 144.334378] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fb1e3fa1f68 [ 144.334955] RBP: 00007fb1e3fa1f60 R08: 0000000000000000 R09: 0000000000000000 [ 144.335792] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb1e3fa1f6c [ 144.336661] R13: 00007ffd8a0a1bbf R14: 00007fb1e1404300 R15: 0000000000022000 [ 144.337561] [ 144.337857] irq event stamp: 622 [ 144.338272] hardirqs last enabled at (621): [] syscall_enter_from_user_mode+0x1d/0x50 [ 144.339412] hardirqs last disabled at (622): [] __schedule+0x1225/0x2470 [ 144.340424] softirqs last enabled at (74): [] __irq_exit_rcu+0x11b/0x180 [ 144.341456] softirqs last disabled at (39): [] __irq_exit_rcu+0x11b/0x180 [ 144.342491] ---[ end trace 0000000000000000 ]--- 11:41:19 executing program 0: futex(0x0, 0x5, 0x0, &(0x7f0000000180), 0x0, 0x0) 11:41:19 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080), 0x6) write$bt_hci(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="03"], 0x7) 11:41:19 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCGSOFTCAR(r0, 0x5423, &(0x7f0000000040)) 11:41:19 executing program 1: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000cc0)={0x2}, 0x8, 0x0) 11:41:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 11:41:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="580000000001010400000000000000000a000000440001802c000180140003002001000000000000000000000000000014000400ff0200000000000000000000000000010c000280040001"], 0x58}}, 0x0) 11:41:19 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xc5}, 0xf) 11:41:19 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0x47, 0x0, 0x0, 0x0, 0x0, "ce397fb01034ede6a83d9a69b41b2d8b21772f"}) [ 146.574896] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 146.576159] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 11:41:19 executing program 1: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000cc0)={0x2}, 0x8, 0x0) 11:41:19 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080), 0x6) write$bt_hci(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="03"], 0x7) 11:41:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="580000000001010400000000000000000a000000440001802c000180140003002001000000000000000000000000000014000400ff0200000000000000000000000000010c000280040001"], 0x58}}, 0x0) 11:41:19 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCGSOFTCAR(r0, 0x5423, &(0x7f0000000040)) 11:41:19 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xc5}, 0xf) [ 146.754898] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 146.756278] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 11:41:19 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0x47, 0x0, 0x0, 0x0, 0x0, "ce397fb01034ede6a83d9a69b41b2d8b21772f"}) 11:41:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="580000000001010400000000000000000a000000440001802c000180140003002001000000000000000000000000000014000400ff0200000000000000000000000000010c000280040001"], 0x58}}, 0x0) 11:41:19 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0x47, 0x0, 0x0, 0x0, 0x0, "ce397fb01034ede6a83d9a69b41b2d8b21772f"}) 11:41:19 executing program 1: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000cc0)={0x2}, 0x8, 0x0) 11:41:19 executing program 0: futex(0x0, 0x5, 0x0, &(0x7f0000000180), 0x0, 0x0) 11:41:19 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080), 0x6) write$bt_hci(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="03"], 0x7) 11:41:19 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xc5}, 0xf) 11:41:19 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCGSOFTCAR(r0, 0x5423, &(0x7f0000000040)) 11:41:19 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0x47, 0x0, 0x0, 0x0, 0x0, "ce397fb01034ede6a83d9a69b41b2d8b21772f"}) [ 146.902596] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 146.903926] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 11:41:19 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0x47, 0x0, 0x0, 0x0, 0x0, "ce397fb01034ede6a83d9a69b41b2d8b21772f"}) 11:41:19 executing program 0: futex(0x0, 0x5, 0x0, &(0x7f0000000180), 0x0, 0x0) 11:41:19 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCGSOFTCAR(r0, 0x5423, &(0x7f0000000040)) 11:41:19 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0x47, 0x0, 0x0, 0x0, 0x0, "ce397fb01034ede6a83d9a69b41b2d8b21772f"}) 11:41:19 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xc5}, 0xf) 11:41:19 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xc5}, 0xf) 11:41:19 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080), 0x6) write$bt_hci(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="03"], 0x7) 11:41:19 executing program 6: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080), 0x6) write$bt_hci(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="03"], 0x7) 11:41:19 executing program 6: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080), 0x6) write$bt_hci(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="03"], 0x7) 11:41:19 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080), 0x6) write$bt_hci(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="03"], 0x7) 11:41:19 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xc5}, 0xf) 11:41:19 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xc5}, 0xf) 11:41:19 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCGSOFTCAR(r0, 0x5423, &(0x7f0000000040)) 11:41:19 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080), 0x6) write$bt_hci(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="03"], 0x7) 11:41:19 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xc5}, 0xf) [ 147.349685] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.7'. [ 147.351070] netlink: 'syz-executor.7': attribute type 1 has an invalid length. 11:41:19 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xc5}, 0xf) 11:41:19 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCGSOFTCAR(r0, 0x5423, &(0x7f0000000040)) 11:41:19 executing program 6: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080), 0x6) write$bt_hci(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="03"], 0x7) 11:41:19 executing program 7: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="580000000001010400000000000000000a000000440001802c000180140003002001000000000000000000000000000014000400ff0200000000000000000000000000010c000280040001"], 0x58}}, 0x0) 11:41:20 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000bc0), 0x125500, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000c00)) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f00000002c0)='./mnt\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="0200000001000000000000000400000000000000100000000300000020"], 0x24, 0x1) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000580)=""/173, 0xad}, {&(0x7f0000000640)=""/87, 0x57}, {&(0x7f00000006c0)=""/212, 0xd4}], 0x3, &(0x7f0000000800)=[@rights={{0x10}}, @cred={{0x1c}}], 0x30}, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3fac, &(0x7f0000000b00)={0x0, 0xdcb6, 0x20, 0x1, 0x30d, 0x0, r2}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000280), &(0x7f0000000b80)) openat(r1, &(0x7f0000000380)='./mnt\x00', 0x10501, 0x180) chmod(&(0x7f0000000ac0)='./mnt\x00', 0xe) getxattr(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00', &(0x7f0000000300)=""/86, 0x56) 11:41:20 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) 11:41:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:20 executing program 3: r0 = syz_io_uring_setup(0x178f, &(0x7f0000000080)={0x0, 0x0, 0x900, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_CLOSE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x7) io_uring_enter(r0, 0x64d0, 0x0, 0x0, 0x0, 0x0) 11:41:20 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) 11:41:20 executing program 7: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="580000000001010400000000000000000a000000440001802c000180140003002001000000000000000000000000000014000400ff0200000000000000000000000000010c000280040001"], 0x58}}, 0x0) [ 147.502644] hrtimer: interrupt took 18585 ns 11:41:20 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000bc0), 0x125500, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000c00)) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f00000002c0)='./mnt\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="0200000001000000000000000400000000000000100000000300000020"], 0x24, 0x1) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000580)=""/173, 0xad}, {&(0x7f0000000640)=""/87, 0x57}, {&(0x7f00000006c0)=""/212, 0xd4}], 0x3, &(0x7f0000000800)=[@rights={{0x10}}, @cred={{0x1c}}], 0x30}, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3fac, &(0x7f0000000b00)={0x0, 0xdcb6, 0x20, 0x1, 0x30d, 0x0, r2}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000280), &(0x7f0000000b80)) openat(r1, &(0x7f0000000380)='./mnt\x00', 0x10501, 0x180) chmod(&(0x7f0000000ac0)='./mnt\x00', 0xe) getxattr(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00', &(0x7f0000000300)=""/86, 0x56) [ 147.533356] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.7'. [ 147.534733] netlink: 'syz-executor.7': attribute type 1 has an invalid length. 11:41:20 executing program 7: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="580000000001010400000000000000000a000000440001802c000180140003002001000000000000000000000000000014000400ff0200000000000000000000000000010c000280040001"], 0x58}}, 0x0) [ 147.636280] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.7'. [ 147.637697] netlink: 'syz-executor.7': attribute type 1 has an invalid length. 11:41:20 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000bc0), 0x125500, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000c00)) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f00000002c0)='./mnt\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="0200000001000000000000000400000000000000100000000300000020"], 0x24, 0x1) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000580)=""/173, 0xad}, {&(0x7f0000000640)=""/87, 0x57}, {&(0x7f00000006c0)=""/212, 0xd4}], 0x3, &(0x7f0000000800)=[@rights={{0x10}}, @cred={{0x1c}}], 0x30}, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3fac, &(0x7f0000000b00)={0x0, 0xdcb6, 0x20, 0x1, 0x30d, 0x0, r2}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000280), &(0x7f0000000b80)) openat(r1, &(0x7f0000000380)='./mnt\x00', 0x10501, 0x180) chmod(&(0x7f0000000ac0)='./mnt\x00', 0xe) getxattr(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00', &(0x7f0000000300)=""/86, 0x56) 11:41:20 executing program 3: r0 = syz_io_uring_setup(0x178f, &(0x7f0000000080)={0x0, 0x0, 0x900, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_CLOSE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x7) io_uring_enter(r0, 0x64d0, 0x0, 0x0, 0x0, 0x0) 11:41:20 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) 11:41:20 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000bc0), 0x125500, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000c00)) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f00000002c0)='./mnt\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="0200000001000000000000000400000000000000100000000300000020"], 0x24, 0x1) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000580)=""/173, 0xad}, {&(0x7f0000000640)=""/87, 0x57}, {&(0x7f00000006c0)=""/212, 0xd4}], 0x3, &(0x7f0000000800)=[@rights={{0x10}}, @cred={{0x1c}}], 0x30}, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3fac, &(0x7f0000000b00)={0x0, 0xdcb6, 0x20, 0x1, 0x30d, 0x0, r2}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000280), &(0x7f0000000b80)) openat(r1, &(0x7f0000000380)='./mnt\x00', 0x10501, 0x180) chmod(&(0x7f0000000ac0)='./mnt\x00', 0xe) getxattr(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00', &(0x7f0000000300)=""/86, 0x56) 11:41:20 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000bc0), 0x125500, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000c00)) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f00000002c0)='./mnt\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="0200000001000000000000000400000000000000100000000300000020"], 0x24, 0x1) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000580)=""/173, 0xad}, {&(0x7f0000000640)=""/87, 0x57}, {&(0x7f00000006c0)=""/212, 0xd4}], 0x3, &(0x7f0000000800)=[@rights={{0x10}}, @cred={{0x1c}}], 0x30}, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3fac, &(0x7f0000000b00)={0x0, 0xdcb6, 0x20, 0x1, 0x30d, 0x0, r2}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000280), &(0x7f0000000b80)) openat(r1, &(0x7f0000000380)='./mnt\x00', 0x10501, 0x180) chmod(&(0x7f0000000ac0)='./mnt\x00', 0xe) getxattr(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00', &(0x7f0000000300)=""/86, 0x56) 11:41:20 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) 11:41:20 executing program 3: r0 = syz_io_uring_setup(0x178f, &(0x7f0000000080)={0x0, 0x0, 0x900, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_CLOSE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x7) io_uring_enter(r0, 0x64d0, 0x0, 0x0, 0x0, 0x0) 11:41:20 executing program 6: r0 = syz_io_uring_setup(0x178f, &(0x7f0000000080)={0x0, 0x0, 0x900, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_CLOSE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x7) io_uring_enter(r0, 0x64d0, 0x0, 0x0, 0x0, 0x0) 11:41:20 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000bc0), 0x125500, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000c00)) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f00000002c0)='./mnt\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="0200000001000000000000000400000000000000100000000300000020"], 0x24, 0x1) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000580)=""/173, 0xad}, {&(0x7f0000000640)=""/87, 0x57}, {&(0x7f00000006c0)=""/212, 0xd4}], 0x3, &(0x7f0000000800)=[@rights={{0x10}}, @cred={{0x1c}}], 0x30}, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3fac, &(0x7f0000000b00)={0x0, 0xdcb6, 0x20, 0x1, 0x30d, 0x0, r2}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000280), &(0x7f0000000b80)) openat(r1, &(0x7f0000000380)='./mnt\x00', 0x10501, 0x180) chmod(&(0x7f0000000ac0)='./mnt\x00', 0xe) getxattr(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00', &(0x7f0000000300)=""/86, 0x56) 11:41:20 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000bc0), 0x125500, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000c00)) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f00000002c0)='./mnt\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="0200000001000000000000000400000000000000100000000300000020"], 0x24, 0x1) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000580)=""/173, 0xad}, {&(0x7f0000000640)=""/87, 0x57}, {&(0x7f00000006c0)=""/212, 0xd4}], 0x3, &(0x7f0000000800)=[@rights={{0x10}}, @cred={{0x1c}}], 0x30}, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3fac, &(0x7f0000000b00)={0x0, 0xdcb6, 0x20, 0x1, 0x30d, 0x0, r2}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000280), &(0x7f0000000b80)) openat(r1, &(0x7f0000000380)='./mnt\x00', 0x10501, 0x180) chmod(&(0x7f0000000ac0)='./mnt\x00', 0xe) getxattr(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00', &(0x7f0000000300)=""/86, 0x56) 11:41:20 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000bc0), 0x125500, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000c00)) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f00000002c0)='./mnt\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="0200000001000000000000000400000000000000100000000300000020"], 0x24, 0x1) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000580)=""/173, 0xad}, {&(0x7f0000000640)=""/87, 0x57}, {&(0x7f00000006c0)=""/212, 0xd4}], 0x3, &(0x7f0000000800)=[@rights={{0x10}}, @cred={{0x1c}}], 0x30}, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3fac, &(0x7f0000000b00)={0x0, 0xdcb6, 0x20, 0x1, 0x30d, 0x0, r2}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000280), &(0x7f0000000b80)) openat(r1, &(0x7f0000000380)='./mnt\x00', 0x10501, 0x180) chmod(&(0x7f0000000ac0)='./mnt\x00', 0xe) getxattr(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00', &(0x7f0000000300)=""/86, 0x56) 11:41:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:21 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="7472616f3d8ea3940d1b6ae3f7e732d951f2a8f450592e0057bd6975bddc09eb7c26e3ceb6c7b0da0f9a9615a2967a1e0f92824a0ab7b9a6bfbe28647327d8f4e1a85556f8c78edede20f3d7d9098cd356612ccbcd446f48050499d95acec41cc4f3e828a1117a2091b2acfa0bfbae08da4c82b845b593da518f7c107e6b4165a6d5258fb99691520fbff84e3291da3737ba09210d310111c6dd20a66b789fd4c2a677601acdfe4fbc5a6d2e59950284c89c000000000000000000008f86587a2af16d33cd96010525dc45f7f67e9261e1bfeaa4d49656dae33ec679f03cf2db4ba3fc6e4e76a01861fbafa64f045e1f4c3cd5b2b2ea2aceee169b2c3b552cdaa95f65ef3135", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:21 executing program 3: r0 = syz_io_uring_setup(0x178f, &(0x7f0000000080)={0x0, 0x0, 0x900, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_CLOSE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x7) io_uring_enter(r0, 0x64d0, 0x0, 0x0, 0x0, 0x0) 11:41:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:21 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000bc0), 0x125500, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000c00)) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f00000002c0)='./mnt\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="0200000001000000000000000400000000000000100000000300000020"], 0x24, 0x1) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000580)=""/173, 0xad}, {&(0x7f0000000640)=""/87, 0x57}, {&(0x7f00000006c0)=""/212, 0xd4}], 0x3, &(0x7f0000000800)=[@rights={{0x10}}, @cred={{0x1c}}], 0x30}, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3fac, &(0x7f0000000b00)={0x0, 0xdcb6, 0x20, 0x1, 0x30d, 0x0, r2}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000280), &(0x7f0000000b80)) openat(r1, &(0x7f0000000380)='./mnt\x00', 0x10501, 0x180) chmod(&(0x7f0000000ac0)='./mnt\x00', 0xe) getxattr(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00', &(0x7f0000000300)=""/86, 0x56) 11:41:21 executing program 6: r0 = syz_io_uring_setup(0x178f, &(0x7f0000000080)={0x0, 0x0, 0x900, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_CLOSE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x7) io_uring_enter(r0, 0x64d0, 0x0, 0x0, 0x0, 0x0) 11:41:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:22 executing program 6: r0 = syz_io_uring_setup(0x178f, &(0x7f0000000080)={0x0, 0x0, 0x900, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_CLOSE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x7) io_uring_enter(r0, 0x64d0, 0x0, 0x0, 0x0, 0x0) 11:41:22 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000bc0), 0x125500, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000c00)) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f00000002c0)='./mnt\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="0200000001000000000000000400000000000000100000000300000020"], 0x24, 0x1) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000580)=""/173, 0xad}, {&(0x7f0000000640)=""/87, 0x57}, {&(0x7f00000006c0)=""/212, 0xd4}], 0x3, &(0x7f0000000800)=[@rights={{0x10}}, @cred={{0x1c}}], 0x30}, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3fac, &(0x7f0000000b00)={0x0, 0xdcb6, 0x20, 0x1, 0x30d, 0x0, r2}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000280), &(0x7f0000000b80)) openat(r1, &(0x7f0000000380)='./mnt\x00', 0x10501, 0x180) chmod(&(0x7f0000000ac0)='./mnt\x00', 0xe) getxattr(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00', &(0x7f0000000300)=""/86, 0x56) 11:41:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:22 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:22 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:22 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:22 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="7472616f3d8ea3940d1b6ae3f7e732d951f2a8f450592e0057bd6975bddc09eb7c26e3ceb6c7b0da0f9a9615a2967a1e0f92824a0ab7b9a6bfbe28647327d8f4e1a85556f8c78edede20f3d7d9098cd356612ccbcd446f48050499d95acec41cc4f3e828a1117a2091b2acfa0bfbae08da4c82b845b593da518f7c107e6b4165a6d5258fb99691520fbff84e3291da3737ba09210d310111c6dd20a66b789fd4c2a677601acdfe4fbc5a6d2e59950284c89c000000000000000000008f86587a2af16d33cd96010525dc45f7f67e9261e1bfeaa4d49656dae33ec679f03cf2db4ba3fc6e4e76a01861fbafa64f045e1f4c3cd5b2b2ea2aceee169b2c3b552cdaa95f65ef3135", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="7472616f3d8ea3940d1b6ae3f7e732d951f2a8f450592e0057bd6975bddc09eb7c26e3ceb6c7b0da0f9a9615a2967a1e0f92824a0ab7b9a6bfbe28647327d8f4e1a85556f8c78edede20f3d7d9098cd356612ccbcd446f48050499d95acec41cc4f3e828a1117a2091b2acfa0bfbae08da4c82b845b593da518f7c107e6b4165a6d5258fb99691520fbff84e3291da3737ba09210d310111c6dd20a66b789fd4c2a677601acdfe4fbc5a6d2e59950284c89c000000000000000000008f86587a2af16d33cd96010525dc45f7f67e9261e1bfeaa4d49656dae33ec679f03cf2db4ba3fc6e4e76a01861fbafa64f045e1f4c3cd5b2b2ea2aceee169b2c3b552cdaa95f65ef3135", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:22 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:23 executing program 6: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000bc0), 0x125500, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000c00)) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f00000002c0)='./mnt\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="0200000001000000000000000400000000000000100000000300000020"], 0x24, 0x1) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000580)=""/173, 0xad}, {&(0x7f0000000640)=""/87, 0x57}, {&(0x7f00000006c0)=""/212, 0xd4}], 0x3, &(0x7f0000000800)=[@rights={{0x10}}, @cred={{0x1c}}], 0x30}, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3fac, &(0x7f0000000b00)={0x0, 0xdcb6, 0x20, 0x1, 0x30d, 0x0, r2}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000280), &(0x7f0000000b80)) openat(r1, &(0x7f0000000380)='./mnt\x00', 0x10501, 0x180) chmod(&(0x7f0000000ac0)='./mnt\x00', 0xe) getxattr(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00', &(0x7f0000000300)=""/86, 0x56) 11:41:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="7472616f3d8ea3940d1b6ae3f7e732d951f2a8f450592e0057bd6975bddc09eb7c26e3ceb6c7b0da0f9a9615a2967a1e0f92824a0ab7b9a6bfbe28647327d8f4e1a85556f8c78edede20f3d7d9098cd356612ccbcd446f48050499d95acec41cc4f3e828a1117a2091b2acfa0bfbae08da4c82b845b593da518f7c107e6b4165a6d5258fb99691520fbff84e3291da3737ba09210d310111c6dd20a66b789fd4c2a677601acdfe4fbc5a6d2e59950284c89c000000000000000000008f86587a2af16d33cd96010525dc45f7f67e9261e1bfeaa4d49656dae33ec679f03cf2db4ba3fc6e4e76a01861fbafa64f045e1f4c3cd5b2b2ea2aceee169b2c3b552cdaa95f65ef3135", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="7472616f3d8ea3940d1b6ae3f7e732d951f2a8f450592e0057bd6975bddc09eb7c26e3ceb6c7b0da0f9a9615a2967a1e0f92824a0ab7b9a6bfbe28647327d8f4e1a85556f8c78edede20f3d7d9098cd356612ccbcd446f48050499d95acec41cc4f3e828a1117a2091b2acfa0bfbae08da4c82b845b593da518f7c107e6b4165a6d5258fb99691520fbff84e3291da3737ba09210d310111c6dd20a66b789fd4c2a677601acdfe4fbc5a6d2e59950284c89c000000000000000000008f86587a2af16d33cd96010525dc45f7f67e9261e1bfeaa4d49656dae33ec679f03cf2db4ba3fc6e4e76a01861fbafa64f045e1f4c3cd5b2b2ea2aceee169b2c3b552cdaa95f65ef3135", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:23 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000bc0), 0x125500, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000c00)) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f00000002c0)='./mnt\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="0200000001000000000000000400000000000000100000000300000020"], 0x24, 0x1) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000580)=""/173, 0xad}, {&(0x7f0000000640)=""/87, 0x57}, {&(0x7f00000006c0)=""/212, 0xd4}], 0x3, &(0x7f0000000800)=[@rights={{0x10}}, @cred={{0x1c}}], 0x30}, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3fac, &(0x7f0000000b00)={0x0, 0xdcb6, 0x20, 0x1, 0x30d, 0x0, r2}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000280), &(0x7f0000000b80)) openat(r1, &(0x7f0000000380)='./mnt\x00', 0x10501, 0x180) chmod(&(0x7f0000000ac0)='./mnt\x00', 0xe) getxattr(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00', &(0x7f0000000300)=""/86, 0x56) 11:41:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:23 executing program 6: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000bc0), 0x125500, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000c00)) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f00000002c0)='./mnt\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="0200000001000000000000000400000000000000100000000300000020"], 0x24, 0x1) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000580)=""/173, 0xad}, {&(0x7f0000000640)=""/87, 0x57}, {&(0x7f00000006c0)=""/212, 0xd4}], 0x3, &(0x7f0000000800)=[@rights={{0x10}}, @cred={{0x1c}}], 0x30}, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3fac, &(0x7f0000000b00)={0x0, 0xdcb6, 0x20, 0x1, 0x30d, 0x0, r2}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000280), &(0x7f0000000b80)) openat(r1, &(0x7f0000000380)='./mnt\x00', 0x10501, 0x180) chmod(&(0x7f0000000ac0)='./mnt\x00', 0xe) getxattr(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00', &(0x7f0000000300)=""/86, 0x56) 11:41:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x242, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000001140)=""/50, &(0x7f0000001180)=0x32) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) sendfile(r1, r4, 0x0, 0xffffffffffffffe1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x42, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x800000000000b663, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x894a0, 0x7, 0xff, 0x6, 0xd8, 0x800, 0x100, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x100000) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x2a400, 0x0) 11:41:23 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000bc0), 0x125500, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000c00)) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f00000002c0)='./mnt\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="0200000001000000000000000400000000000000100000000300000020"], 0x24, 0x1) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000580)=""/173, 0xad}, {&(0x7f0000000640)=""/87, 0x57}, {&(0x7f00000006c0)=""/212, 0xd4}], 0x3, &(0x7f0000000800)=[@rights={{0x10}}, @cred={{0x1c}}], 0x30}, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3fac, &(0x7f0000000b00)={0x0, 0xdcb6, 0x20, 0x1, 0x30d, 0x0, r2}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000280), &(0x7f0000000b80)) openat(r1, &(0x7f0000000380)='./mnt\x00', 0x10501, 0x180) chmod(&(0x7f0000000ac0)='./mnt\x00', 0xe) getxattr(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00', &(0x7f0000000300)=""/86, 0x56) 11:41:23 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000bc0), 0x1 VM DIAGNOSIS: 11:41:17 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=ffff88806cf3d460 RCX=0000000000000000 RDX=ffff88801007d040 RSI=ffffffff813bbc04 RDI=0000000000000005 RBP=0000000000000003 RSP=ffff888022a8f948 R8 =0000000000000005 R9 =0000000000000000 R10=0000000000000001 R11=0000000000000001 R12=ffffed100d9e7a8d R13=0000000000000001 R14=ffff88806cf3d468 R15=dffffc0000000000 RIP=ffffffff813bbc06 RFL=00000293 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0000 0000000000000000 00000000 00000000 DS =0000 0000000000000000 00000000 00000000 FS =0000 0000555556a35400 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fb1e3f9b55c CR3=00000000382d2000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007fb1e3f757c0 00007fb1e3f757c8 YMM02=0000000000000000 0000000000000000 00007fb1e3f757e0 00007fb1e3f757c0 YMM03=0000000000000000 0000000000000000 00007fb1e3f757c8 00007fb1e3f757c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=000000000000005b RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b17e1 RDI=ffffffff87645be0 RBP=ffffffff87645ba0 RSP=ffff88803a207348 R8 =0000000000000001 R9 =000000000000000a R10=000000000000005b R11=0000000000000001 R12=000000000000005b R13=ffffffff87645ba0 R14=0000000000000010 R15=ffffffff822b17d0 RIP=ffffffff822b1839 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fb1e1404700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fdb60a7db90 CR3=00000000382d2000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007fb1e3f757c0 00007fb1e3f757c8 YMM02=0000000000000000 0000000000000000 00007fb1e3f757e0 00007fb1e3f757c0 YMM03=0000000000000000 0000000000000000 00007fb1e3f757c8 00007fb1e3f757c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000