Warning: Permanently added '10.128.0.171' (ECDSA) to the list of known hosts. 2021/08/06 04:24:56 fuzzer started 2021/08/06 04:24:56 dialing manager at 10.128.0.163:39197 2021/08/06 04:24:56 syscalls: 1973 2021/08/06 04:24:56 code coverage: enabled 2021/08/06 04:24:56 comparison tracing: enabled 2021/08/06 04:24:56 extra coverage: enabled 2021/08/06 04:24:56 setuid sandbox: enabled 2021/08/06 04:24:56 namespace sandbox: enabled 2021/08/06 04:24:56 Android sandbox: enabled 2021/08/06 04:24:56 fault injection: enabled 2021/08/06 04:24:56 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/08/06 04:24:56 net packet injection: /dev/net/tun does not exist 2021/08/06 04:24:56 net device setup: enabled 2021/08/06 04:24:56 concurrency sanitizer: enabled 2021/08/06 04:24:56 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/08/06 04:24:56 USB emulation: /dev/raw-gadget does not exist 2021/08/06 04:24:56 hci packet injection: /dev/vhci does not exist 2021/08/06 04:24:56 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2021/08/06 04:24:56 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 2021/08/06 04:24:57 suppressing KCSAN reports in functions: 'blk_mq_sched_dispatch_requests' 'lookup_fast' 'kauditd_thread' 'n_tty_receive_buf_common' 'audit_log_start' '__xa_clear_mark' 'shmem_mknod' 'ext4_free_inodes_count' 'internal_add_timer' 'dd_has_work' 'generic_write_end' 'ext4_mark_iloc_dirty' 'xas_clear_mark' 'expire_timers' 2021/08/06 04:24:57 fetching corpus: 0, signal 0/2000 (executing program) 2021/08/06 04:24:57 fetching corpus: 49, signal 14820/18479 (executing program) 2021/08/06 04:24:57 fetching corpus: 99, signal 22358/27573 (executing program) 2021/08/06 04:24:57 fetching corpus: 149, signal 32278/38803 (executing program) 2021/08/06 04:24:57 fetching corpus: 199, signal 36043/43977 (executing program) 2021/08/06 04:24:57 fetching corpus: 249, signal 40207/49451 (executing program) 2021/08/06 04:24:57 fetching corpus: 299, signal 42857/53474 (executing program) 2021/08/06 04:24:57 fetching corpus: 349, signal 46815/58638 (executing program) 2021/08/06 04:24:57 fetching corpus: 399, signal 50598/63538 (executing program) 2021/08/06 04:24:57 fetching corpus: 449, signal 53818/67798 (executing program) 2021/08/06 04:24:57 fetching corpus: 499, signal 56837/71861 (executing program) 2021/08/06 04:24:57 fetching corpus: 549, signal 59727/75720 (executing program) 2021/08/06 04:24:57 fetching corpus: 599, signal 62254/79236 (executing program) 2021/08/06 04:24:57 fetching corpus: 649, signal 63991/82013 (executing program) 2021/08/06 04:24:57 fetching corpus: 699, signal 65633/84658 (executing program) 2021/08/06 04:24:57 fetching corpus: 749, signal 68294/88108 (executing program) 2021/08/06 04:24:57 fetching corpus: 799, signal 69914/90692 (executing program) 2021/08/06 04:24:58 fetching corpus: 849, signal 71951/93515 (executing program) 2021/08/06 04:24:58 fetching corpus: 898, signal 74777/96930 (executing program) 2021/08/06 04:24:58 fetching corpus: 948, signal 76868/99735 (executing program) 2021/08/06 04:24:58 fetching corpus: 998, signal 79011/102548 (executing program) 2021/08/06 04:24:58 fetching corpus: 1048, signal 80508/104819 (executing program) 2021/08/06 04:24:58 fetching corpus: 1098, signal 83177/107958 (executing program) 2021/08/06 04:24:58 fetching corpus: 1148, signal 84463/109963 (executing program) 2021/08/06 04:24:58 fetching corpus: 1198, signal 86293/112364 (executing program) 2021/08/06 04:24:58 fetching corpus: 1248, signal 87238/114105 (executing program) 2021/08/06 04:24:58 fetching corpus: 1298, signal 89342/116608 (executing program) 2021/08/06 04:24:58 fetching corpus: 1348, signal 90459/118410 (executing program) 2021/08/06 04:24:58 fetching corpus: 1398, signal 91653/120217 (executing program) 2021/08/06 04:24:58 fetching corpus: 1448, signal 92683/121886 (executing program) 2021/08/06 04:24:58 fetching corpus: 1498, signal 93825/123603 (executing program) 2021/08/06 04:24:58 fetching corpus: 1548, signal 96443/126235 (executing program) 2021/08/06 04:24:58 fetching corpus: 1598, signal 97275/127758 (executing program) 2021/08/06 04:24:58 fetching corpus: 1648, signal 98525/129458 (executing program) 2021/08/06 04:24:58 fetching corpus: 1698, signal 99925/131233 (executing program) 2021/08/06 04:24:58 fetching corpus: 1748, signal 101141/132851 (executing program) 2021/08/06 04:24:58 fetching corpus: 1798, signal 101918/134200 (executing program) 2021/08/06 04:24:58 fetching corpus: 1848, signal 102869/135570 (executing program) 2021/08/06 04:24:58 fetching corpus: 1897, signal 104288/137244 (executing program) 2021/08/06 04:24:59 fetching corpus: 1947, signal 105795/138935 (executing program) 2021/08/06 04:24:59 fetching corpus: 1997, signal 106617/140206 (executing program) 2021/08/06 04:24:59 fetching corpus: 2047, signal 108041/141768 (executing program) 2021/08/06 04:24:59 fetching corpus: 2097, signal 109017/143117 (executing program) 2021/08/06 04:24:59 fetching corpus: 2147, signal 110076/144424 (executing program) 2021/08/06 04:24:59 fetching corpus: 2197, signal 111916/146186 (executing program) 2021/08/06 04:24:59 fetching corpus: 2246, signal 113195/147533 (executing program) 2021/08/06 04:24:59 fetching corpus: 2295, signal 113980/148643 (executing program) 2021/08/06 04:24:59 fetching corpus: 2345, signal 114977/149825 (executing program) 2021/08/06 04:24:59 fetching corpus: 2392, signal 116007/150981 (executing program) 2021/08/06 04:24:59 fetching corpus: 2442, signal 116654/151952 (executing program) 2021/08/06 04:24:59 fetching corpus: 2490, signal 119378/153759 (executing program) 2021/08/06 04:24:59 fetching corpus: 2540, signal 120094/154770 (executing program) 2021/08/06 04:24:59 fetching corpus: 2590, signal 121070/155851 (executing program) 2021/08/06 04:24:59 fetching corpus: 2639, signal 121741/156793 (executing program) 2021/08/06 04:24:59 fetching corpus: 2689, signal 122291/157684 (executing program) 2021/08/06 04:24:59 fetching corpus: 2738, signal 122999/158657 (executing program) 2021/08/06 04:24:59 fetching corpus: 2788, signal 123686/159607 (executing program) 2021/08/06 04:24:59 fetching corpus: 2838, signal 124729/160633 (executing program) 2021/08/06 04:24:59 fetching corpus: 2888, signal 125560/161496 (executing program) 2021/08/06 04:24:59 fetching corpus: 2938, signal 126778/162478 (executing program) 2021/08/06 04:24:59 fetching corpus: 2988, signal 127602/163361 (executing program) 2021/08/06 04:24:59 fetching corpus: 3038, signal 127999/164048 (executing program) 2021/08/06 04:24:59 fetching corpus: 3088, signal 128954/164930 (executing program) 2021/08/06 04:25:00 fetching corpus: 3138, signal 129814/165782 (executing program) 2021/08/06 04:25:00 fetching corpus: 3188, signal 130821/166636 (executing program) 2021/08/06 04:25:00 fetching corpus: 3238, signal 131591/167427 (executing program) 2021/08/06 04:25:00 fetching corpus: 3288, signal 132364/168127 (executing program) 2021/08/06 04:25:00 fetching corpus: 3337, signal 132981/168769 (executing program) 2021/08/06 04:25:00 fetching corpus: 3387, signal 133642/169442 (executing program) 2021/08/06 04:25:00 fetching corpus: 3437, signal 134224/170121 (executing program) 2021/08/06 04:25:00 fetching corpus: 3487, signal 134912/170783 (executing program) 2021/08/06 04:25:00 fetching corpus: 3537, signal 135563/171399 (executing program) 2021/08/06 04:25:00 fetching corpus: 3587, signal 136168/172021 (executing program) 2021/08/06 04:25:00 fetching corpus: 3637, signal 136708/172631 (executing program) 2021/08/06 04:25:00 fetching corpus: 3686, signal 137061/173162 (executing program) 2021/08/06 04:25:00 fetching corpus: 3735, signal 137563/173717 (executing program) 2021/08/06 04:25:00 fetching corpus: 3785, signal 138031/174295 (executing program) 2021/08/06 04:25:00 fetching corpus: 3835, signal 138606/174849 (executing program) 2021/08/06 04:25:00 fetching corpus: 3885, signal 139100/175371 (executing program) 2021/08/06 04:25:00 fetching corpus: 3935, signal 140058/175913 (executing program) 2021/08/06 04:25:00 fetching corpus: 3985, signal 140788/176421 (executing program) 2021/08/06 04:25:00 fetching corpus: 4035, signal 141463/176926 (executing program) 2021/08/06 04:25:00 fetching corpus: 4085, signal 142059/177427 (executing program) 2021/08/06 04:25:00 fetching corpus: 4135, signal 142611/177894 (executing program) 2021/08/06 04:25:00 fetching corpus: 4185, signal 143113/178314 (executing program) 2021/08/06 04:25:00 fetching corpus: 4235, signal 143597/178755 (executing program) 2021/08/06 04:25:01 fetching corpus: 4285, signal 144445/179201 (executing program) 2021/08/06 04:25:01 fetching corpus: 4335, signal 145145/179635 (executing program) 2021/08/06 04:25:01 fetching corpus: 4385, signal 145717/180021 (executing program) 2021/08/06 04:25:01 fetching corpus: 4435, signal 146127/180418 (executing program) 2021/08/06 04:25:01 fetching corpus: 4485, signal 146466/180523 (executing program) 2021/08/06 04:25:01 fetching corpus: 4535, signal 147252/180523 (executing program) 2021/08/06 04:25:01 fetching corpus: 4585, signal 147837/180523 (executing program) 2021/08/06 04:25:01 fetching corpus: 4635, signal 148212/180523 (executing program) 2021/08/06 04:25:01 fetching corpus: 4685, signal 148643/180523 (executing program) 2021/08/06 04:25:01 fetching corpus: 4735, signal 149053/180523 (executing program) 2021/08/06 04:25:01 fetching corpus: 4785, signal 149778/180527 (executing program) 2021/08/06 04:25:01 fetching corpus: 4835, signal 150604/180527 (executing program) 2021/08/06 04:25:01 fetching corpus: 4885, signal 151014/180527 (executing program) 2021/08/06 04:25:01 fetching corpus: 4935, signal 151464/180527 (executing program) 2021/08/06 04:25:01 fetching corpus: 4985, signal 151930/180527 (executing program) 2021/08/06 04:25:01 fetching corpus: 5035, signal 152311/180527 (executing program) 2021/08/06 04:25:01 fetching corpus: 5085, signal 153245/180527 (executing program) 2021/08/06 04:25:01 fetching corpus: 5135, signal 153715/180547 (executing program) 2021/08/06 04:25:01 fetching corpus: 5185, signal 154158/180566 (executing program) 2021/08/06 04:25:01 fetching corpus: 5235, signal 154567/180566 (executing program) 2021/08/06 04:25:01 fetching corpus: 5285, signal 154972/180566 (executing program) 2021/08/06 04:25:01 fetching corpus: 5335, signal 155518/180566 (executing program) 2021/08/06 04:25:01 fetching corpus: 5385, signal 156137/180566 (executing program) 2021/08/06 04:25:01 fetching corpus: 5435, signal 156585/180566 (executing program) 2021/08/06 04:25:01 fetching corpus: 5485, signal 157083/180567 (executing program) 2021/08/06 04:25:01 fetching corpus: 5535, signal 157666/180575 (executing program) 2021/08/06 04:25:01 fetching corpus: 5585, signal 158421/180575 (executing program) 2021/08/06 04:25:02 fetching corpus: 5635, signal 158995/180575 (executing program) 2021/08/06 04:25:02 fetching corpus: 5685, signal 159307/180575 (executing program) 2021/08/06 04:25:02 fetching corpus: 5735, signal 159711/180575 (executing program) 2021/08/06 04:25:02 fetching corpus: 5785, signal 160081/180575 (executing program) 2021/08/06 04:25:02 fetching corpus: 5835, signal 160388/180577 (executing program) 2021/08/06 04:25:02 fetching corpus: 5885, signal 160707/180577 (executing program) 2021/08/06 04:25:02 fetching corpus: 5935, signal 161040/180588 (executing program) 2021/08/06 04:25:02 fetching corpus: 5985, signal 161717/180592 (executing program) 2021/08/06 04:25:02 fetching corpus: 6034, signal 162028/180596 (executing program) 2021/08/06 04:25:02 fetching corpus: 6082, signal 162456/180615 (executing program) 2021/08/06 04:25:02 fetching corpus: 6132, signal 162777/180615 (executing program) 2021/08/06 04:25:02 fetching corpus: 6182, signal 163299/180615 (executing program) 2021/08/06 04:25:02 fetching corpus: 6232, signal 163672/180615 (executing program) 2021/08/06 04:25:02 fetching corpus: 6282, signal 164169/180615 (executing program) 2021/08/06 04:25:02 fetching corpus: 6332, signal 164472/180617 (executing program) 2021/08/06 04:25:02 fetching corpus: 6382, signal 164708/180617 (executing program) 2021/08/06 04:25:02 fetching corpus: 6432, signal 165164/180617 (executing program) 2021/08/06 04:25:02 fetching corpus: 6482, signal 165569/180617 (executing program) 2021/08/06 04:25:02 fetching corpus: 6532, signal 165914/180617 (executing program) 2021/08/06 04:25:02 fetching corpus: 6582, signal 166530/180617 (executing program) 2021/08/06 04:25:02 fetching corpus: 6632, signal 167126/180617 (executing program) 2021/08/06 04:25:02 fetching corpus: 6682, signal 167601/180617 (executing program) 2021/08/06 04:25:02 fetching corpus: 6732, signal 168046/180617 (executing program) 2021/08/06 04:25:02 fetching corpus: 6782, signal 168583/180617 (executing program) 2021/08/06 04:25:02 fetching corpus: 6832, signal 169074/180617 (executing program) 2021/08/06 04:25:02 fetching corpus: 6882, signal 169348/180617 (executing program) 2021/08/06 04:25:02 fetching corpus: 6932, signal 169635/180617 (executing program) 2021/08/06 04:25:03 fetching corpus: 6982, signal 170061/180617 (executing program) 2021/08/06 04:25:03 fetching corpus: 7032, signal 170501/180621 (executing program) 2021/08/06 04:25:03 fetching corpus: 7082, signal 170862/180633 (executing program) 2021/08/06 04:25:03 fetching corpus: 7132, signal 171282/180633 (executing program) 2021/08/06 04:25:03 fetching corpus: 7182, signal 171612/180633 (executing program) 2021/08/06 04:25:03 fetching corpus: 7232, signal 172024/180633 (executing program) 2021/08/06 04:25:03 fetching corpus: 7282, signal 172282/180633 (executing program) 2021/08/06 04:25:03 fetching corpus: 7332, signal 172555/180633 (executing program) 2021/08/06 04:25:03 fetching corpus: 7382, signal 172814/180633 (executing program) 2021/08/06 04:25:03 fetching corpus: 7432, signal 173155/180633 (executing program) 2021/08/06 04:25:03 fetching corpus: 7482, signal 173595/180633 (executing program) 2021/08/06 04:25:03 fetching corpus: 7532, signal 173941/180655 (executing program) 2021/08/06 04:25:03 fetching corpus: 7582, signal 174299/180655 (executing program) 2021/08/06 04:25:03 fetching corpus: 7632, signal 174498/180677 (executing program) 2021/08/06 04:25:03 fetching corpus: 7680, signal 175001/180688 (executing program) 2021/08/06 04:25:03 fetching corpus: 7730, signal 175263/180688 (executing program) 2021/08/06 04:25:03 fetching corpus: 7780, signal 175649/180688 (executing program) 2021/08/06 04:25:03 fetching corpus: 7830, signal 176082/180688 (executing program) 2021/08/06 04:25:03 fetching corpus: 7880, signal 176495/180688 (executing program) 2021/08/06 04:25:03 fetching corpus: 7930, signal 176848/180688 (executing program) 2021/08/06 04:25:03 fetching corpus: 7980, signal 177217/180688 (executing program) 2021/08/06 04:25:03 fetching corpus: 8030, signal 177619/180688 (executing program) 2021/08/06 04:25:03 fetching corpus: 8080, signal 177998/180688 (executing program) 2021/08/06 04:25:03 fetching corpus: 8130, signal 178463/180688 (executing program) 2021/08/06 04:25:03 fetching corpus: 8180, signal 178837/180690 (executing program) 2021/08/06 04:25:03 fetching corpus: 8230, signal 179208/180703 (executing program) 2021/08/06 04:25:03 fetching corpus: 8256, signal 179431/180710 (executing program) 2021/08/06 04:25:03 fetching corpus: 8256, signal 179431/180710 (executing program) 2021/08/06 04:25:05 starting 6 fuzzer processes 04:25:05 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x149042, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000000)={[{@size, 0xa}], [], 0x9}) 04:25:05 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000001180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00003}]}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000280)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40082102, &(0x7f0000001580)={r1}) 04:25:05 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000080)={0x0, 0x6}) 04:25:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newsa={0x148, 0x10, 0x713, 0x0, 0x0, {{@in=@loopback, @in6=@private2}, {@in6=@remote, 0x0, 0x33}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'hmac(sha256)\x00'}}}, @replay_val={0x10}]}, 0x148}}, 0x0) 04:25:05 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)) fcntl$notify(r0, 0x402, 0xb1c661d318500c51) r1 = fork() r2 = syz_open_procfs(0x0, &(0x7f0000000040)) tkill(r1, 0x6) fcntl$notify(r2, 0x402, 0xb1c661d318500c5c) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) wait4(0x0, 0x0, 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0, 0x0) 04:25:05 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x1}, {}], 0x2) semop(r0, &(0x7f0000000180)=[{0x0, 0x0, 0x1800}], 0x1) syzkaller login: [ 27.416121][ T24] audit: type=1400 audit(1628223905.389:8): avc: denied { execmem } for pid=1783 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 27.504153][ T1788] cgroup: Unknown subsys name 'perf_event' [ 27.519580][ T1789] cgroup: Unknown subsys name 'perf_event' [ 27.525998][ T1789] cgroup: Unknown subsys name 'net_cls' [ 27.529619][ T1788] cgroup: Unknown subsys name 'net_cls' [ 27.552552][ T1792] cgroup: Unknown subsys name 'perf_event' [ 27.556110][ T1791] cgroup: Unknown subsys name 'perf_event' [ 27.560077][ T1792] cgroup: Unknown subsys name 'net_cls' [ 27.565708][ T1794] cgroup: Unknown subsys name 'perf_event' [ 27.571355][ T1795] cgroup: Unknown subsys name 'perf_event' [ 27.575948][ T1794] cgroup: Unknown subsys name 'net_cls' [ 27.583895][ T1795] cgroup: Unknown subsys name 'net_cls' [ 27.589084][ T1791] cgroup: Unknown subsys name 'net_cls' 04:25:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newsa={0x148, 0x10, 0x713, 0x0, 0x0, {{@in=@loopback, @in6=@private2}, {@in6=@remote, 0x0, 0x33}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'hmac(sha256)\x00'}}}, @replay_val={0x10}]}, 0x148}}, 0x0) 04:25:09 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000080)={0x0, 0x6}) 04:25:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newsa={0x148, 0x10, 0x713, 0x0, 0x0, {{@in=@loopback, @in6=@private2}, {@in6=@remote, 0x0, 0x33}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'hmac(sha256)\x00'}}}, @replay_val={0x10}]}, 0x148}}, 0x0) 04:25:09 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000080)={0x0, 0x6}) 04:25:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newsa={0x148, 0x10, 0x713, 0x0, 0x0, {{@in=@loopback, @in6=@private2}, {@in6=@remote, 0x0, 0x33}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'hmac(sha256)\x00'}}}, @replay_val={0x10}]}, 0x148}}, 0x0) 04:25:09 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000080)={0x0, 0x6}) 04:25:09 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x149042, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000000)={[{@size, 0xa}], [], 0x9}) [ 31.688652][ T4536] tmpfs: Bad value for 'size' [ 31.729704][ T4551] tmpfs: Bad value for 'size' 04:25:10 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000001180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00003}]}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000280)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40082102, &(0x7f0000001580)={r1}) 04:25:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000004f40)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f00000026c0)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000005040)=[@flowinfo={{0x14, 0x29, 0xb, 0x200}}], 0x18}}], 0x2, 0x0) 04:25:10 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x149042, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000000)={[{@size, 0xa}], [], 0x9}) 04:25:10 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x50, 0x0, &(0x7f00000000c0)) 04:25:10 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)) fcntl$notify(r0, 0x402, 0xb1c661d318500c51) r1 = fork() r2 = syz_open_procfs(0x0, &(0x7f0000000040)) tkill(r1, 0x6) fcntl$notify(r2, 0x402, 0xb1c661d318500c5c) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) wait4(0x0, 0x0, 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0, 0x0) 04:25:10 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x1}, {}], 0x2) semop(r0, &(0x7f0000000180)=[{0x0, 0x0, 0x1800}], 0x1) 04:25:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000004f40)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f00000026c0)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000005040)=[@flowinfo={{0x14, 0x29, 0xb, 0x200}}], 0x18}}], 0x2, 0x0) 04:25:10 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)) fcntl$notify(r0, 0x402, 0xb1c661d318500c51) r1 = fork() r2 = syz_open_procfs(0x0, &(0x7f0000000040)) tkill(r1, 0x6) fcntl$notify(r2, 0x402, 0xb1c661d318500c5c) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) wait4(0x0, 0x0, 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0, 0x0) 04:25:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000004f40)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f00000026c0)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000005040)=[@flowinfo={{0x14, 0x29, 0xb, 0x200}}], 0x18}}], 0x2, 0x0) 04:25:10 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x149042, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000000)={[{@size, 0xa}], [], 0x9}) 04:25:10 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x50, 0x0, &(0x7f00000000c0)) 04:25:10 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)) fcntl$notify(r0, 0x402, 0xb1c661d318500c51) r1 = fork() r2 = syz_open_procfs(0x0, &(0x7f0000000040)) tkill(r1, 0x6) fcntl$notify(r2, 0x402, 0xb1c661d318500c5c) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) wait4(0x0, 0x0, 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0, 0x0) [ 32.751141][ T4583] tmpfs: Bad value for 'size' [ 32.792068][ T4606] tmpfs: Bad value for 'size' 04:25:11 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000001180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00003}]}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000280)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40082102, &(0x7f0000001580)={r1}) 04:25:11 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000004f40)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f00000026c0)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000005040)=[@flowinfo={{0x14, 0x29, 0xb, 0x200}}], 0x18}}], 0x2, 0x0) 04:25:11 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x50, 0x0, &(0x7f00000000c0)) 04:25:11 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000001180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00003}]}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000280)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40082102, &(0x7f0000001580)={r1}) 04:25:11 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x1}, {}], 0x2) semop(r0, &(0x7f0000000180)=[{0x0, 0x0, 0x1800}], 0x1) 04:25:11 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)) fcntl$notify(r0, 0x402, 0xb1c661d318500c51) r1 = fork() r2 = syz_open_procfs(0x0, &(0x7f0000000040)) tkill(r1, 0x6) fcntl$notify(r2, 0x402, 0xb1c661d318500c5c) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) wait4(0x0, 0x0, 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0, 0x0) 04:25:11 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x50, 0x0, &(0x7f00000000c0)) 04:25:11 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8c, &(0x7f0000000200)="8d31e183156939000000e28c0b1dd2a357b264c8745b78376e18cd3d3dfcb946cf885a21539a0c4a081ceeb24ac13830c1beaa1b4dc69190f8d2802fab69347b9a915308c4829b4b43353c485f8bb2965cd7e1292aaa6375f12e594a37c9686d403d3a82d09ec2e57d3c3ec2117496b2dd4837334f73c37edfd46003eb96a9c79d3de0cab4645adde76e8ac9"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) tkill(r1, 0x34) 04:25:11 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)) fcntl$notify(r0, 0x402, 0xb1c661d318500c51) r1 = fork() r2 = syz_open_procfs(0x0, &(0x7f0000000040)) tkill(r1, 0x6) fcntl$notify(r2, 0x402, 0xb1c661d318500c5c) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) wait4(0x0, 0x0, 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0, 0x0) 04:25:11 executing program 2: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000000)='system_u:object_r:auditd_log_t:s0\x00', 0x22) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000000180)=""/147, 0x93}], 0x1, 0x0, 0x0) 04:25:11 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)) fcntl$notify(r0, 0x402, 0xb1c661d318500c51) r1 = fork() r2 = syz_open_procfs(0x0, &(0x7f0000000040)) tkill(r1, 0x6) fcntl$notify(r2, 0x402, 0xb1c661d318500c5c) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) wait4(0x0, 0x0, 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0, 0x0) 04:25:11 executing program 2: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000000)='system_u:object_r:auditd_log_t:s0\x00', 0x22) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000000180)=""/147, 0x93}], 0x1, 0x0, 0x0) [ 33.680879][ T24] audit: type=1400 audit(1628223911.651:9): avc: denied { create } for pid=4658 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:auditd_log_t:s0 tclass=key permissive=1 04:25:12 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000001180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00003}]}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000280)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40082102, &(0x7f0000001580)={r1}) 04:25:12 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8c, &(0x7f0000000200)="8d31e183156939000000e28c0b1dd2a357b264c8745b78376e18cd3d3dfcb946cf885a21539a0c4a081ceeb24ac13830c1beaa1b4dc69190f8d2802fab69347b9a915308c4829b4b43353c485f8bb2965cd7e1292aaa6375f12e594a37c9686d403d3a82d09ec2e57d3c3ec2117496b2dd4837334f73c37edfd46003eb96a9c79d3de0cab4645adde76e8ac9"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) tkill(r1, 0x34) 04:25:12 executing program 2: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000000)='system_u:object_r:auditd_log_t:s0\x00', 0x22) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000000180)=""/147, 0x93}], 0x1, 0x0, 0x0) 04:25:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000180)='./file0/bus\x00', 0x6857b21ff1155d10) r1 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') write$P9_RREADLINK(r3, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYRESHEX=r4, @ANYRES16=r4, @ANYRESDEC, @ANYRESOCT=r0, @ANYRESHEX=r1], 0x1c) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/locks\x00', 0x0, 0x0) lseek(r5, 0x1000000000000003, 0x0) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) 04:25:12 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000001180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00003}]}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000280)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40082102, &(0x7f0000001580)={r1}) 04:25:12 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x1}, {}], 0x2) semop(r0, &(0x7f0000000180)=[{0x0, 0x0, 0x1800}], 0x1) 04:25:12 executing program 2: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000000)='system_u:object_r:auditd_log_t:s0\x00', 0x22) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000000180)=""/147, 0x93}], 0x1, 0x0, 0x0) 04:25:12 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x4040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000680)={r0, 0x9a, 0x0, 0x3}) unshare(0x8000400) r2 = dup3(r1, r1, 0x80000) r3 = accept4$inet(r2, &(0x7f0000000180)={0x2, 0x0, @empty}, &(0x7f0000000480)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x1, 0x8, 0xe0, 0x800, 0x1, 0x3, 0xffff, 0x1d9, 0xfffffffffffffeec, 0xa7, 0x12000, 0x3f, 0x38, 0x1, 0x5, 0x7, 0x5}, [{0x60000000, 0x6, 0x401, 0x8000, 0x80000, 0x1f4, 0x7fff, 0x1000}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x478) r4 = mq_open(&(0x7f0000000000)='m$\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) mq_notify(r4, &(0x7f00000004c0)={0x0, 0x36}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)) mq_notify(r4, &(0x7f0000000600)={0x0, 0x3, 0x1, @thr={&(0x7f0000000d00)="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", &(0x7f0000000500)="d292f8d44576c524679c5da818481d8ae515d17f618a410624c61306aa543a5a5989fd0f903b42c679a48036bb3bd07e987704fac3d0361e2de6d6383ca6015cdbce7e370634e95005a18d5be9752bc76fc36dec73fa1b04749aa2dd19c6f03b2c2fe7ac6f6a28771a263c60fcefb10dc805cf0600000080003bb52f75bb5d9a58e9c68b776e0000007451b80d52c32c30ff2ec1cc3a0300ddb27509abeed1e6c57dab264448b23dad386652fb305dfbaa22"}}) unshare(0x20000) setns(0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x9f, 0x81, 0x3, 0x0, 0x2f3f091, 0x2c000, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f00000001c0), 0x9}, 0x8080, 0x4, 0x1, 0x2, 0xc24, 0x1, 0x7, 0x0, 0x9, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0xa) clone(0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000500)) r5 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x0073\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x841, 0x0, 0x0) preadv(r5, &(0x7f0000000380)=[{&(0x7f0000002880)=""/4103, 0x1007}, {&(0x7f00000007c0)=""/190, 0xbe}, {&(0x7f00000003c0)=""/192, 0xc0}], 0x3, 0x1, 0x8800) [ 34.499627][ C1] hrtimer: interrupt took 57688 ns 04:25:12 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8c, &(0x7f0000000200)="8d31e183156939000000e28c0b1dd2a357b264c8745b78376e18cd3d3dfcb946cf885a21539a0c4a081ceeb24ac13830c1beaa1b4dc69190f8d2802fab69347b9a915308c4829b4b43353c485f8bb2965cd7e1292aaa6375f12e594a37c9686d403d3a82d09ec2e57d3c3ec2117496b2dd4837334f73c37edfd46003eb96a9c79d3de0cab4645adde76e8ac9"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) tkill(r1, 0x34) 04:25:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000180)='./file0/bus\x00', 0x6857b21ff1155d10) r1 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') write$P9_RREADLINK(r3, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYRESHEX=r4, @ANYRES16=r4, @ANYRESDEC, @ANYRESOCT=r0, @ANYRESHEX=r1], 0x1c) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/locks\x00', 0x0, 0x0) lseek(r5, 0x1000000000000003, 0x0) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) 04:25:12 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8c, &(0x7f0000000200)="8d31e183156939000000e28c0b1dd2a357b264c8745b78376e18cd3d3dfcb946cf885a21539a0c4a081ceeb24ac13830c1beaa1b4dc69190f8d2802fab69347b9a915308c4829b4b43353c485f8bb2965cd7e1292aaa6375f12e594a37c9686d403d3a82d09ec2e57d3c3ec2117496b2dd4837334f73c37edfd46003eb96a9c79d3de0cab4645adde76e8ac9"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) tkill(r1, 0x34) 04:25:12 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x4040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000680)={r0, 0x9a, 0x0, 0x3}) unshare(0x8000400) r2 = dup3(r1, r1, 0x80000) r3 = accept4$inet(r2, &(0x7f0000000180)={0x2, 0x0, @empty}, &(0x7f0000000480)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x1, 0x8, 0xe0, 0x800, 0x1, 0x3, 0xffff, 0x1d9, 0xfffffffffffffeec, 0xa7, 0x12000, 0x3f, 0x38, 0x1, 0x5, 0x7, 0x5}, [{0x60000000, 0x6, 0x401, 0x8000, 0x80000, 0x1f4, 0x7fff, 0x1000}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x478) r4 = mq_open(&(0x7f0000000000)='m$\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) mq_notify(r4, &(0x7f00000004c0)={0x0, 0x36}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)) mq_notify(r4, &(0x7f0000000600)={0x0, 0x3, 0x1, @thr={&(0x7f0000000d00)="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", &(0x7f0000000500)="d292f8d44576c524679c5da818481d8ae515d17f618a410624c61306aa543a5a5989fd0f903b42c679a48036bb3bd07e987704fac3d0361e2de6d6383ca6015cdbce7e370634e95005a18d5be9752bc76fc36dec73fa1b04749aa2dd19c6f03b2c2fe7ac6f6a28771a263c60fcefb10dc805cf0600000080003bb52f75bb5d9a58e9c68b776e0000007451b80d52c32c30ff2ec1cc3a0300ddb27509abeed1e6c57dab264448b23dad386652fb305dfbaa22"}}) unshare(0x20000) setns(0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x9f, 0x81, 0x3, 0x0, 0x2f3f091, 0x2c000, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f00000001c0), 0x9}, 0x8080, 0x4, 0x1, 0x2, 0xc24, 0x1, 0x7, 0x0, 0x9, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0xa) clone(0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000500)) r5 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x0073\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x841, 0x0, 0x0) preadv(r5, &(0x7f0000000380)=[{&(0x7f0000002880)=""/4103, 0x1007}, {&(0x7f00000007c0)=""/190, 0xbe}, {&(0x7f00000003c0)=""/192, 0xc0}], 0x3, 0x1, 0x8800) 04:25:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000180)='./file0/bus\x00', 0x6857b21ff1155d10) r1 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') write$P9_RREADLINK(r3, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYRESHEX=r4, @ANYRES16=r4, @ANYRESDEC, @ANYRESOCT=r0, @ANYRESHEX=r1], 0x1c) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/locks\x00', 0x0, 0x0) lseek(r5, 0x1000000000000003, 0x0) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) 04:25:13 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x4040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000680)={r0, 0x9a, 0x0, 0x3}) unshare(0x8000400) r2 = dup3(r1, r1, 0x80000) r3 = accept4$inet(r2, &(0x7f0000000180)={0x2, 0x0, @empty}, &(0x7f0000000480)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x1, 0x8, 0xe0, 0x800, 0x1, 0x3, 0xffff, 0x1d9, 0xfffffffffffffeec, 0xa7, 0x12000, 0x3f, 0x38, 0x1, 0x5, 0x7, 0x5}, [{0x60000000, 0x6, 0x401, 0x8000, 0x80000, 0x1f4, 0x7fff, 0x1000}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x478) r4 = mq_open(&(0x7f0000000000)='m$\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) mq_notify(r4, &(0x7f00000004c0)={0x0, 0x36}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)) mq_notify(r4, &(0x7f0000000600)={0x0, 0x3, 0x1, @thr={&(0x7f0000000d00)="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", &(0x7f0000000500)="d292f8d44576c524679c5da818481d8ae515d17f618a410624c61306aa543a5a5989fd0f903b42c679a48036bb3bd07e987704fac3d0361e2de6d6383ca6015cdbce7e370634e95005a18d5be9752bc76fc36dec73fa1b04749aa2dd19c6f03b2c2fe7ac6f6a28771a263c60fcefb10dc805cf0600000080003bb52f75bb5d9a58e9c68b776e0000007451b80d52c32c30ff2ec1cc3a0300ddb27509abeed1e6c57dab264448b23dad386652fb305dfbaa22"}}) unshare(0x20000) setns(0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x9f, 0x81, 0x3, 0x0, 0x2f3f091, 0x2c000, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f00000001c0), 0x9}, 0x8080, 0x4, 0x1, 0x2, 0xc24, 0x1, 0x7, 0x0, 0x9, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0xa) clone(0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000500)) r5 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x0073\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x841, 0x0, 0x0) preadv(r5, &(0x7f0000000380)=[{&(0x7f0000002880)=""/4103, 0x1007}, {&(0x7f00000007c0)=""/190, 0xbe}, {&(0x7f00000003c0)=""/192, 0xc0}], 0x3, 0x1, 0x8800) 04:25:13 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x4040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000680)={r0, 0x9a, 0x0, 0x3}) unshare(0x8000400) r2 = dup3(r1, r1, 0x80000) r3 = accept4$inet(r2, &(0x7f0000000180)={0x2, 0x0, @empty}, &(0x7f0000000480)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x1, 0x8, 0xe0, 0x800, 0x1, 0x3, 0xffff, 0x1d9, 0xfffffffffffffeec, 0xa7, 0x12000, 0x3f, 0x38, 0x1, 0x5, 0x7, 0x5}, [{0x60000000, 0x6, 0x401, 0x8000, 0x80000, 0x1f4, 0x7fff, 0x1000}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x478) r4 = mq_open(&(0x7f0000000000)='m$\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) mq_notify(r4, &(0x7f00000004c0)={0x0, 0x36}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)) mq_notify(r4, &(0x7f0000000600)={0x0, 0x3, 0x1, @thr={&(0x7f0000000d00)="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", &(0x7f0000000500)="d292f8d44576c524679c5da818481d8ae515d17f618a410624c61306aa543a5a5989fd0f903b42c679a48036bb3bd07e987704fac3d0361e2de6d6383ca6015cdbce7e370634e95005a18d5be9752bc76fc36dec73fa1b04749aa2dd19c6f03b2c2fe7ac6f6a28771a263c60fcefb10dc805cf0600000080003bb52f75bb5d9a58e9c68b776e0000007451b80d52c32c30ff2ec1cc3a0300ddb27509abeed1e6c57dab264448b23dad386652fb305dfbaa22"}}) unshare(0x20000) setns(0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x9f, 0x81, 0x3, 0x0, 0x2f3f091, 0x2c000, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f00000001c0), 0x9}, 0x8080, 0x4, 0x1, 0x2, 0xc24, 0x1, 0x7, 0x0, 0x9, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0xa) clone(0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000500)) r5 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x0073\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x841, 0x0, 0x0) preadv(r5, &(0x7f0000000380)=[{&(0x7f0000002880)=""/4103, 0x1007}, {&(0x7f00000007c0)=""/190, 0xbe}, {&(0x7f00000003c0)=""/192, 0xc0}], 0x3, 0x1, 0x8800) 04:25:13 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x4040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000680)={r0, 0x9a, 0x0, 0x3}) unshare(0x8000400) r2 = dup3(r1, r1, 0x80000) r3 = accept4$inet(r2, &(0x7f0000000180)={0x2, 0x0, @empty}, &(0x7f0000000480)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x1, 0x8, 0xe0, 0x800, 0x1, 0x3, 0xffff, 0x1d9, 0xfffffffffffffeec, 0xa7, 0x12000, 0x3f, 0x38, 0x1, 0x5, 0x7, 0x5}, [{0x60000000, 0x6, 0x401, 0x8000, 0x80000, 0x1f4, 0x7fff, 0x1000}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x478) r4 = mq_open(&(0x7f0000000000)='m$\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) mq_notify(r4, &(0x7f00000004c0)={0x0, 0x36}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)) mq_notify(r4, &(0x7f0000000600)={0x0, 0x3, 0x1, @thr={&(0x7f0000000d00)="f3e9f20345bb2ed98caf8e8699bbce784a8025b2a2200f5b319de635c2789f71363923d045f6fd0cf9433297dea0c77178e471ee742b6016ed54d172bef714d71f1cadf9ffb6a0e92df266aa450e0d9a11cc06163e99c039154d8ba4e269de4982c42201653f240a3e3772f2c1593dae2eaacb87ebca124661adf95fb81fa63dc2d895bfbd719fd01ba8ffbd82bdc1437d4c0ffba0528caacc0025733211dc00aa98619bba265a7d432e2b66f1adb1abcd39a69c654a5d9538be121258154f04b93983ab9211e1a2cdd365480fe41dfcd959d83a9d051b52b61ea412145105b13567c709f19743e3c6603f68e90b82c2575626aeace94d8edc04472d953daf57e2eacc6448db2ce2afaff65ce1b4e2a8b2c6edcade217000c602935c416d9f2e9969445ab36e43596dcf5e5bd7e3224be2a6cfa600ac55bb9b2ccac5eb85d5bc5c81ee7593831e819f24c9341d", &(0x7f0000000500)="d292f8d44576c524679c5da818481d8ae515d17f618a410624c61306aa543a5a5989fd0f903b42c679a48036bb3bd07e987704fac3d0361e2de6d6383ca6015cdbce7e370634e95005a18d5be9752bc76fc36dec73fa1b04749aa2dd19c6f03b2c2fe7ac6f6a28771a263c60fcefb10dc805cf0600000080003bb52f75bb5d9a58e9c68b776e0000007451b80d52c32c30ff2ec1cc3a0300ddb27509abeed1e6c57dab264448b23dad386652fb305dfbaa22"}}) unshare(0x20000) setns(0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x9f, 0x81, 0x3, 0x0, 0x2f3f091, 0x2c000, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f00000001c0), 0x9}, 0x8080, 0x4, 0x1, 0x2, 0xc24, 0x1, 0x7, 0x0, 0x9, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0xa) clone(0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000500)) r5 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x0073\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x841, 0x0, 0x0) preadv(r5, &(0x7f0000000380)=[{&(0x7f0000002880)=""/4103, 0x1007}, {&(0x7f00000007c0)=""/190, 0xbe}, {&(0x7f00000003c0)=""/192, 0xc0}], 0x3, 0x1, 0x8800) 04:25:13 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000001180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00003}]}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000280)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40082102, &(0x7f0000001580)={r1}) 04:25:13 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x4040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000680)={r0, 0x9a, 0x0, 0x3}) unshare(0x8000400) r2 = dup3(r1, r1, 0x80000) r3 = accept4$inet(r2, &(0x7f0000000180)={0x2, 0x0, @empty}, &(0x7f0000000480)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x1, 0x8, 0xe0, 0x800, 0x1, 0x3, 0xffff, 0x1d9, 0xfffffffffffffeec, 0xa7, 0x12000, 0x3f, 0x38, 0x1, 0x5, 0x7, 0x5}, [{0x60000000, 0x6, 0x401, 0x8000, 0x80000, 0x1f4, 0x7fff, 0x1000}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x478) r4 = mq_open(&(0x7f0000000000)='m$\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) mq_notify(r4, &(0x7f00000004c0)={0x0, 0x36}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)) mq_notify(r4, &(0x7f0000000600)={0x0, 0x3, 0x1, @thr={&(0x7f0000000d00)="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", &(0x7f0000000500)="d292f8d44576c524679c5da818481d8ae515d17f618a410624c61306aa543a5a5989fd0f903b42c679a48036bb3bd07e987704fac3d0361e2de6d6383ca6015cdbce7e370634e95005a18d5be9752bc76fc36dec73fa1b04749aa2dd19c6f03b2c2fe7ac6f6a28771a263c60fcefb10dc805cf0600000080003bb52f75bb5d9a58e9c68b776e0000007451b80d52c32c30ff2ec1cc3a0300ddb27509abeed1e6c57dab264448b23dad386652fb305dfbaa22"}}) unshare(0x20000) setns(0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x9f, 0x81, 0x3, 0x0, 0x2f3f091, 0x2c000, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f00000001c0), 0x9}, 0x8080, 0x4, 0x1, 0x2, 0xc24, 0x1, 0x7, 0x0, 0x9, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0xa) clone(0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000500)) r5 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x0073\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x841, 0x0, 0x0) preadv(r5, &(0x7f0000000380)=[{&(0x7f0000002880)=""/4103, 0x1007}, {&(0x7f00000007c0)=""/190, 0xbe}, {&(0x7f00000003c0)=""/192, 0xc0}], 0x3, 0x1, 0x8800) 04:25:13 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x4040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000680)={r0, 0x9a, 0x0, 0x3}) unshare(0x8000400) r2 = dup3(r1, r1, 0x80000) r3 = accept4$inet(r2, &(0x7f0000000180)={0x2, 0x0, @empty}, &(0x7f0000000480)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x1, 0x8, 0xe0, 0x800, 0x1, 0x3, 0xffff, 0x1d9, 0xfffffffffffffeec, 0xa7, 0x12000, 0x3f, 0x38, 0x1, 0x5, 0x7, 0x5}, [{0x60000000, 0x6, 0x401, 0x8000, 0x80000, 0x1f4, 0x7fff, 0x1000}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x478) r4 = mq_open(&(0x7f0000000000)='m$\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) mq_notify(r4, &(0x7f00000004c0)={0x0, 0x36}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)) mq_notify(r4, &(0x7f0000000600)={0x0, 0x3, 0x1, @thr={&(0x7f0000000d00)="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", &(0x7f0000000500)="d292f8d44576c524679c5da818481d8ae515d17f618a410624c61306aa543a5a5989fd0f903b42c679a48036bb3bd07e987704fac3d0361e2de6d6383ca6015cdbce7e370634e95005a18d5be9752bc76fc36dec73fa1b04749aa2dd19c6f03b2c2fe7ac6f6a28771a263c60fcefb10dc805cf0600000080003bb52f75bb5d9a58e9c68b776e0000007451b80d52c32c30ff2ec1cc3a0300ddb27509abeed1e6c57dab264448b23dad386652fb305dfbaa22"}}) unshare(0x20000) setns(0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x9f, 0x81, 0x3, 0x0, 0x2f3f091, 0x2c000, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f00000001c0), 0x9}, 0x8080, 0x4, 0x1, 0x2, 0xc24, 0x1, 0x7, 0x0, 0x9, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0xa) clone(0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000500)) r5 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x0073\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x841, 0x0, 0x0) preadv(r5, &(0x7f0000000380)=[{&(0x7f0000002880)=""/4103, 0x1007}, {&(0x7f00000007c0)=""/190, 0xbe}, {&(0x7f00000003c0)=""/192, 0xc0}], 0x3, 0x1, 0x8800) 04:25:13 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x4040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000680)={r0, 0x9a, 0x0, 0x3}) unshare(0x8000400) r2 = dup3(r1, r1, 0x80000) r3 = accept4$inet(r2, &(0x7f0000000180)={0x2, 0x0, @empty}, &(0x7f0000000480)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x1, 0x8, 0xe0, 0x800, 0x1, 0x3, 0xffff, 0x1d9, 0xfffffffffffffeec, 0xa7, 0x12000, 0x3f, 0x38, 0x1, 0x5, 0x7, 0x5}, [{0x60000000, 0x6, 0x401, 0x8000, 0x80000, 0x1f4, 0x7fff, 0x1000}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x478) r4 = mq_open(&(0x7f0000000000)='m$\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) mq_notify(r4, &(0x7f00000004c0)={0x0, 0x36}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)) mq_notify(r4, &(0x7f0000000600)={0x0, 0x3, 0x1, @thr={&(0x7f0000000d00)="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", &(0x7f0000000500)="d292f8d44576c524679c5da818481d8ae515d17f618a410624c61306aa543a5a5989fd0f903b42c679a48036bb3bd07e987704fac3d0361e2de6d6383ca6015cdbce7e370634e95005a18d5be9752bc76fc36dec73fa1b04749aa2dd19c6f03b2c2fe7ac6f6a28771a263c60fcefb10dc805cf0600000080003bb52f75bb5d9a58e9c68b776e0000007451b80d52c32c30ff2ec1cc3a0300ddb27509abeed1e6c57dab264448b23dad386652fb305dfbaa22"}}) unshare(0x20000) setns(0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x9f, 0x81, 0x3, 0x0, 0x2f3f091, 0x2c000, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f00000001c0), 0x9}, 0x8080, 0x4, 0x1, 0x2, 0xc24, 0x1, 0x7, 0x0, 0x9, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0xa) clone(0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000500)) r5 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x0073\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x841, 0x0, 0x0) preadv(r5, &(0x7f0000000380)=[{&(0x7f0000002880)=""/4103, 0x1007}, {&(0x7f00000007c0)=""/190, 0xbe}, {&(0x7f00000003c0)=""/192, 0xc0}], 0x3, 0x1, 0x8800) 04:25:13 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x4040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000680)={r0, 0x9a, 0x0, 0x3}) unshare(0x8000400) r2 = dup3(r1, r1, 0x80000) r3 = accept4$inet(r2, &(0x7f0000000180)={0x2, 0x0, @empty}, &(0x7f0000000480)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x1, 0x8, 0xe0, 0x800, 0x1, 0x3, 0xffff, 0x1d9, 0xfffffffffffffeec, 0xa7, 0x12000, 0x3f, 0x38, 0x1, 0x5, 0x7, 0x5}, [{0x60000000, 0x6, 0x401, 0x8000, 0x80000, 0x1f4, 0x7fff, 0x1000}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x478) r4 = mq_open(&(0x7f0000000000)='m$\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) mq_notify(r4, &(0x7f00000004c0)={0x0, 0x36}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)) mq_notify(r4, &(0x7f0000000600)={0x0, 0x3, 0x1, @thr={&(0x7f0000000d00)="f3e9f20345bb2ed98caf8e8699bbce784a8025b2a2200f5b319de635c2789f71363923d045f6fd0cf9433297dea0c77178e471ee742b6016ed54d172bef714d71f1cadf9ffb6a0e92df266aa450e0d9a11cc06163e99c039154d8ba4e269de4982c42201653f240a3e3772f2c1593dae2eaacb87ebca124661adf95fb81fa63dc2d895bfbd719fd01ba8ffbd82bdc1437d4c0ffba0528caacc0025733211dc00aa98619bba265a7d432e2b66f1adb1abcd39a69c654a5d9538be121258154f04b93983ab9211e1a2cdd365480fe41dfcd959d83a9d051b52b61ea412145105b13567c709f19743e3c6603f68e90b82c2575626aeace94d8edc04472d953daf57e2eacc6448db2ce2afaff65ce1b4e2a8b2c6edcade217000c602935c416d9f2e9969445ab36e43596dcf5e5bd7e3224be2a6cfa600ac55bb9b2ccac5eb85d5bc5c81ee7593831e819f24c9341d", &(0x7f0000000500)="d292f8d44576c524679c5da818481d8ae515d17f618a410624c61306aa543a5a5989fd0f903b42c679a48036bb3bd07e987704fac3d0361e2de6d6383ca6015cdbce7e370634e95005a18d5be9752bc76fc36dec73fa1b04749aa2dd19c6f03b2c2fe7ac6f6a28771a263c60fcefb10dc805cf0600000080003bb52f75bb5d9a58e9c68b776e0000007451b80d52c32c30ff2ec1cc3a0300ddb27509abeed1e6c57dab264448b23dad386652fb305dfbaa22"}}) unshare(0x20000) setns(0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x9f, 0x81, 0x3, 0x0, 0x2f3f091, 0x2c000, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f00000001c0), 0x9}, 0x8080, 0x4, 0x1, 0x2, 0xc24, 0x1, 0x7, 0x0, 0x9, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0xa) clone(0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000500)) r5 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x0073\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x841, 0x0, 0x0) preadv(r5, &(0x7f0000000380)=[{&(0x7f0000002880)=""/4103, 0x1007}, {&(0x7f00000007c0)=""/190, 0xbe}, {&(0x7f00000003c0)=""/192, 0xc0}], 0x3, 0x1, 0x8800) 04:25:13 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x4040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000680)={r0, 0x9a, 0x0, 0x3}) unshare(0x8000400) r2 = dup3(r1, r1, 0x80000) r3 = accept4$inet(r2, &(0x7f0000000180)={0x2, 0x0, @empty}, &(0x7f0000000480)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x1, 0x8, 0xe0, 0x800, 0x1, 0x3, 0xffff, 0x1d9, 0xfffffffffffffeec, 0xa7, 0x12000, 0x3f, 0x38, 0x1, 0x5, 0x7, 0x5}, [{0x60000000, 0x6, 0x401, 0x8000, 0x80000, 0x1f4, 0x7fff, 0x1000}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x478) r4 = mq_open(&(0x7f0000000000)='m$\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) mq_notify(r4, &(0x7f00000004c0)={0x0, 0x36}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)) mq_notify(r4, &(0x7f0000000600)={0x0, 0x3, 0x1, @thr={&(0x7f0000000d00)="f3e9f20345bb2ed98caf8e8699bbce784a8025b2a2200f5b319de635c2789f71363923d045f6fd0cf9433297dea0c77178e471ee742b6016ed54d172bef714d71f1cadf9ffb6a0e92df266aa450e0d9a11cc06163e99c039154d8ba4e269de4982c42201653f240a3e3772f2c1593dae2eaacb87ebca124661adf95fb81fa63dc2d895bfbd719fd01ba8ffbd82bdc1437d4c0ffba0528caacc0025733211dc00aa98619bba265a7d432e2b66f1adb1abcd39a69c654a5d9538be121258154f04b93983ab9211e1a2cdd365480fe41dfcd959d83a9d051b52b61ea412145105b13567c709f19743e3c6603f68e90b82c2575626aeace94d8edc04472d953daf57e2eacc6448db2ce2afaff65ce1b4e2a8b2c6edcade217000c602935c416d9f2e9969445ab36e43596dcf5e5bd7e3224be2a6cfa600ac55bb9b2ccac5eb85d5bc5c81ee7593831e819f24c9341d", &(0x7f0000000500)="d292f8d44576c524679c5da818481d8ae515d17f618a410624c61306aa543a5a5989fd0f903b42c679a48036bb3bd07e987704fac3d0361e2de6d6383ca6015cdbce7e370634e95005a18d5be9752bc76fc36dec73fa1b04749aa2dd19c6f03b2c2fe7ac6f6a28771a263c60fcefb10dc805cf0600000080003bb52f75bb5d9a58e9c68b776e0000007451b80d52c32c30ff2ec1cc3a0300ddb27509abeed1e6c57dab264448b23dad386652fb305dfbaa22"}}) unshare(0x20000) setns(0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x9f, 0x81, 0x3, 0x0, 0x2f3f091, 0x2c000, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f00000001c0), 0x9}, 0x8080, 0x4, 0x1, 0x2, 0xc24, 0x1, 0x7, 0x0, 0x9, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0xa) clone(0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000500)) r5 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x0073\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x841, 0x0, 0x0) preadv(r5, &(0x7f0000000380)=[{&(0x7f0000002880)=""/4103, 0x1007}, {&(0x7f00000007c0)=""/190, 0xbe}, {&(0x7f00000003c0)=""/192, 0xc0}], 0x3, 0x1, 0x8800) 04:25:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000180)='./file0/bus\x00', 0x6857b21ff1155d10) r1 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') write$P9_RREADLINK(r3, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYRESHEX=r4, @ANYRES16=r4, @ANYRESDEC, @ANYRESOCT=r0, @ANYRESHEX=r1], 0x1c) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/locks\x00', 0x0, 0x0) lseek(r5, 0x1000000000000003, 0x0) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) 04:25:13 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x4040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000680)={r0, 0x9a, 0x0, 0x3}) unshare(0x8000400) r2 = dup3(r1, r1, 0x80000) r3 = accept4$inet(r2, &(0x7f0000000180)={0x2, 0x0, @empty}, &(0x7f0000000480)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x1, 0x8, 0xe0, 0x800, 0x1, 0x3, 0xffff, 0x1d9, 0xfffffffffffffeec, 0xa7, 0x12000, 0x3f, 0x38, 0x1, 0x5, 0x7, 0x5}, [{0x60000000, 0x6, 0x401, 0x8000, 0x80000, 0x1f4, 0x7fff, 0x1000}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x478) r4 = mq_open(&(0x7f0000000000)='m$\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) mq_notify(r4, &(0x7f00000004c0)={0x0, 0x36}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)) mq_notify(r4, &(0x7f0000000600)={0x0, 0x3, 0x1, @thr={&(0x7f0000000d00)="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", &(0x7f0000000500)="d292f8d44576c524679c5da818481d8ae515d17f618a410624c61306aa543a5a5989fd0f903b42c679a48036bb3bd07e987704fac3d0361e2de6d6383ca6015cdbce7e370634e95005a18d5be9752bc76fc36dec73fa1b04749aa2dd19c6f03b2c2fe7ac6f6a28771a263c60fcefb10dc805cf0600000080003bb52f75bb5d9a58e9c68b776e0000007451b80d52c32c30ff2ec1cc3a0300ddb27509abeed1e6c57dab264448b23dad386652fb305dfbaa22"}}) unshare(0x20000) setns(0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x9f, 0x81, 0x3, 0x0, 0x2f3f091, 0x2c000, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f00000001c0), 0x9}, 0x8080, 0x4, 0x1, 0x2, 0xc24, 0x1, 0x7, 0x0, 0x9, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0xa) clone(0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000500)) r5 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x0073\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x841, 0x0, 0x0) preadv(r5, &(0x7f0000000380)=[{&(0x7f0000002880)=""/4103, 0x1007}, {&(0x7f00000007c0)=""/190, 0xbe}, {&(0x7f00000003c0)=""/192, 0xc0}], 0x3, 0x1, 0x8800) 04:25:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000180)='./file0/bus\x00', 0x6857b21ff1155d10) r1 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') write$P9_RREADLINK(r3, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYRESHEX=r4, @ANYRES16=r4, @ANYRESDEC, @ANYRESOCT=r0, @ANYRESHEX=r1], 0x1c) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/locks\x00', 0x0, 0x0) lseek(r5, 0x1000000000000003, 0x0) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) 04:25:13 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x4040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000680)={r0, 0x9a, 0x0, 0x3}) unshare(0x8000400) r2 = dup3(r1, r1, 0x80000) r3 = accept4$inet(r2, &(0x7f0000000180)={0x2, 0x0, @empty}, &(0x7f0000000480)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x1, 0x8, 0xe0, 0x800, 0x1, 0x3, 0xffff, 0x1d9, 0xfffffffffffffeec, 0xa7, 0x12000, 0x3f, 0x38, 0x1, 0x5, 0x7, 0x5}, [{0x60000000, 0x6, 0x401, 0x8000, 0x80000, 0x1f4, 0x7fff, 0x1000}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x478) r4 = mq_open(&(0x7f0000000000)='m$\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) mq_notify(r4, &(0x7f00000004c0)={0x0, 0x36}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)) mq_notify(r4, &(0x7f0000000600)={0x0, 0x3, 0x1, @thr={&(0x7f0000000d00)="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", &(0x7f0000000500)="d292f8d44576c524679c5da818481d8ae515d17f618a410624c61306aa543a5a5989fd0f903b42c679a48036bb3bd07e987704fac3d0361e2de6d6383ca6015cdbce7e370634e95005a18d5be9752bc76fc36dec73fa1b04749aa2dd19c6f03b2c2fe7ac6f6a28771a263c60fcefb10dc805cf0600000080003bb52f75bb5d9a58e9c68b776e0000007451b80d52c32c30ff2ec1cc3a0300ddb27509abeed1e6c57dab264448b23dad386652fb305dfbaa22"}}) unshare(0x20000) setns(0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x9f, 0x81, 0x3, 0x0, 0x2f3f091, 0x2c000, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f00000001c0), 0x9}, 0x8080, 0x4, 0x1, 0x2, 0xc24, 0x1, 0x7, 0x0, 0x9, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0xa) clone(0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000500)) r5 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x0073\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x841, 0x0, 0x0) preadv(r5, &(0x7f0000000380)=[{&(0x7f0000002880)=""/4103, 0x1007}, {&(0x7f00000007c0)=""/190, 0xbe}, {&(0x7f00000003c0)=""/192, 0xc0}], 0x3, 0x1, 0x8800) 04:25:13 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x4040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000680)={r0, 0x9a, 0x0, 0x3}) unshare(0x8000400) r2 = dup3(r1, r1, 0x80000) r3 = accept4$inet(r2, &(0x7f0000000180)={0x2, 0x0, @empty}, &(0x7f0000000480)=0x10, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x1, 0x8, 0xe0, 0x800, 0x1, 0x3, 0xffff, 0x1d9, 0xfffffffffffffeec, 0xa7, 0x12000, 0x3f, 0x38, 0x1, 0x5, 0x7, 0x5}, [{0x60000000, 0x6, 0x401, 0x8000, 0x80000, 0x1f4, 0x7fff, 0x1000}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x478) r4 = mq_open(&(0x7f0000000000)='m$\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) mq_notify(r4, &(0x7f00000004c0)={0x0, 0x36}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)) mq_notify(r4, &(0x7f0000000600)={0x0, 0x3, 0x1, @thr={&(0x7f0000000d00)="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", &(0x7f0000000500)="d292f8d44576c524679c5da818481d8ae515d17f618a410624c61306aa543a5a5989fd0f903b42c679a48036bb3bd07e987704fac3d0361e2de6d6383ca6015cdbce7e370634e95005a18d5be9752bc76fc36dec73fa1b04749aa2dd19c6f03b2c2fe7ac6f6a28771a263c60fcefb10dc805cf0600000080003bb52f75bb5d9a58e9c68b776e0000007451b80d52c32c30ff2ec1cc3a0300ddb27509abeed1e6c57dab264448b23dad386652fb305dfbaa22"}}) unshare(0x20000) setns(0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x9f, 0x81, 0x3, 0x0, 0x2f3f091, 0x2c000, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f00000001c0), 0x9}, 0x8080, 0x4, 0x1, 0x2, 0xc24, 0x1, 0x7, 0x0, 0x9, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0xa) clone(0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000500)) r5 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x0073\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x841, 0x0, 0x0) preadv(r5, &(0x7f0000000380)=[{&(0x7f0000002880)=""/4103, 0x1007}, {&(0x7f00000007c0)=""/190, 0xbe}, {&(0x7f00000003c0)=""/192, 0xc0}], 0x3, 0x1, 0x8800) 04:25:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000180)='./file0/bus\x00', 0x6857b21ff1155d10) r1 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') write$P9_RREADLINK(r3, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYRESHEX=r4, @ANYRES16=r4, @ANYRESDEC, @ANYRESOCT=r0, @ANYRESHEX=r1], 0x1c) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/locks\x00', 0x0, 0x0) lseek(r5, 0x1000000000000003, 0x0) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) 04:25:14 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x9, 0x8) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000000), r0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x78, r1, 0x1, 0x0, 0x0, {0x3}, [@NLBL_UNLABEL_A_SECCTX={0x26, 0x7, 'system_u:object_r:cron_spool_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback={0x100000000000000}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x78}, 0x1, 0x1000000}, 0x0) 04:25:14 executing program 5: socket(0x2, 0xa, 0xe2) 04:25:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x13a, &(0x7f0000000240)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/61, 0x3d}], 0x1, 0x5, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x40) 04:25:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000180)='./file0/bus\x00', 0x6857b21ff1155d10) r1 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') write$P9_RREADLINK(r3, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYRESHEX=r4, @ANYRES16=r4, @ANYRESDEC, @ANYRESOCT=r0, @ANYRESHEX=r1], 0x1c) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/locks\x00', 0x0, 0x0) lseek(r5, 0x1000000000000003, 0x0) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) 04:25:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000180)='./file0/bus\x00', 0x6857b21ff1155d10) r1 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') write$P9_RREADLINK(r3, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYRESHEX=r4, @ANYRES16=r4, @ANYRESDEC, @ANYRESOCT=r0, @ANYRESHEX=r1], 0x1c) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/locks\x00', 0x0, 0x0) lseek(r5, 0x1000000000000003, 0x0) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) 04:25:14 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d14) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) close(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) creat(&(0x7f0000000100)='./bus\x00', 0x0) 04:25:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x13a, &(0x7f0000000240)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/61, 0x3d}], 0x1, 0x5, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x40) 04:25:14 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d14) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) close(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) creat(&(0x7f0000000100)='./bus\x00', 0x0) [ 36.220421][ T4827] syz-executor.5 uses obsolete (PF_INET,SOCK_PACKET) 04:25:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x13a, &(0x7f0000000240)="433900009919da078a0098d16ee0a593b040f7629100f06ee04fa447a3ba82583a96ea57ff22ea97be19af3deba01419cd2386ad591576000000007312339b2e45335c46c8b969166c4c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70012173d6efa56b60f48cf0c9d0989ecbbfc220bd2bc1d68e9ac5b2695dd75b2a399c49d339df101a4f29107c42c16986300a780dd6e6bda906c695dbc77073a0757ed829db1e797c23bb3bc62747f7417d674be84b0555b3a5f09edd4d3d23fb5f6e4bfd7bf509201603fda5f9b3b273452abdf40a37ae00000000000000000000000000000000cf4a76fad1f909d9e2d669bad9fd061cdd784dfb22f28592d14bb0518ca6392e34c7bee99bfbf3e83644a29e0a3b382508aaafd14c9a367c37f53435245aa4646ff7af9d302cddf9e5cbeb27652933cbbe819797ea4356"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/61, 0x3d}], 0x1, 0x5, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x40) 04:25:14 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x9, 0x8) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000000), r0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x78, r1, 0x1, 0x0, 0x0, {0x3}, [@NLBL_UNLABEL_A_SECCTX={0x26, 0x7, 'system_u:object_r:cron_spool_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback={0x100000000000000}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x78}, 0x1, 0x1000000}, 0x0) 04:25:14 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d14) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) close(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) creat(&(0x7f0000000100)='./bus\x00', 0x0) 04:25:14 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d14) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) close(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) creat(&(0x7f0000000100)='./bus\x00', 0x0) 04:25:14 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x9, 0x8) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000000), r0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x78, r1, 0x1, 0x0, 0x0, {0x3}, [@NLBL_UNLABEL_A_SECCTX={0x26, 0x7, 'system_u:object_r:cron_spool_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback={0x100000000000000}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x78}, 0x1, 0x1000000}, 0x0) 04:25:14 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d14) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) close(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) creat(&(0x7f0000000100)='./bus\x00', 0x0) 04:25:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x13a, &(0x7f0000000240)="433900009919da078a0098d16ee0a593b040f7629100f06ee04fa447a3ba82583a96ea57ff22ea97be19af3deba01419cd2386ad591576000000007312339b2e45335c46c8b969166c4c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70012173d6efa56b60f48cf0c9d0989ecbbfc220bd2bc1d68e9ac5b2695dd75b2a399c49d339df101a4f29107c42c16986300a780dd6e6bda906c695dbc77073a0757ed829db1e797c23bb3bc62747f7417d674be84b0555b3a5f09edd4d3d23fb5f6e4bfd7bf509201603fda5f9b3b273452abdf40a37ae00000000000000000000000000000000cf4a76fad1f909d9e2d669bad9fd061cdd784dfb22f28592d14bb0518ca6392e34c7bee99bfbf3e83644a29e0a3b382508aaafd14c9a367c37f53435245aa4646ff7af9d302cddf9e5cbeb27652933cbbe819797ea4356"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/61, 0x3d}], 0x1, 0x5, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x40) 04:25:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000180)='./file0/bus\x00', 0x6857b21ff1155d10) r1 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') write$P9_RREADLINK(r3, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYRESHEX=r4, @ANYRES16=r4, @ANYRESDEC, @ANYRESOCT=r0, @ANYRESHEX=r1], 0x1c) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/locks\x00', 0x0, 0x0) lseek(r5, 0x1000000000000003, 0x0) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) 04:25:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000180)='./file0/bus\x00', 0x6857b21ff1155d10) r1 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') write$P9_RREADLINK(r3, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYRESHEX=r4, @ANYRES16=r4, @ANYRESDEC, @ANYRESOCT=r0, @ANYRESHEX=r1], 0x1c) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/locks\x00', 0x0, 0x0) lseek(r5, 0x1000000000000003, 0x0) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) 04:25:14 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d14) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) close(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) creat(&(0x7f0000000100)='./bus\x00', 0x0) 04:25:14 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d14) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) close(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) creat(&(0x7f0000000100)='./bus\x00', 0x0) 04:25:14 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x9, 0x8) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000000), r0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x78, r1, 0x1, 0x0, 0x0, {0x3}, [@NLBL_UNLABEL_A_SECCTX={0x26, 0x7, 'system_u:object_r:cron_spool_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback={0x100000000000000}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x78}, 0x1, 0x1000000}, 0x0) 04:25:14 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d14) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) close(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) creat(&(0x7f0000000100)='./bus\x00', 0x0) 04:25:14 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d14) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) close(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) creat(&(0x7f0000000100)='./bus\x00', 0x0) 04:25:14 executing program 3: r0 = socket(0xa, 0x3, 0x1) getsockopt$inet6_opts(r0, 0x29, 0x3a, 0x0, &(0x7f0000000140)) 04:25:14 executing program 5: futex(&(0x7f0000000000)=0x2, 0x8b, 0x2, 0x0, 0x0, 0x0) futex(&(0x7f0000000000), 0x81, 0x0, 0x0, 0x0, 0x0) 04:25:14 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) r2 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) io_submit(r5, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f00000002c0)="da", 0x1}]) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r3, r6, 0x0, 0x8400fffffffb) sendfile(r2, r2, 0x0, 0x8080ffffff80) 04:25:14 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d14) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) close(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) creat(&(0x7f0000000100)='./bus\x00', 0x0) 04:25:14 executing program 3: r0 = socket(0xa, 0x3, 0x1) getsockopt$inet6_opts(r0, 0x29, 0x3a, 0x0, &(0x7f0000000140)) 04:25:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x18, r2, 0xb15, 0x0, 0x0, {0x17}, [@HEADER={0x4}]}, 0x18}}, 0x0) 04:25:14 executing program 4: r0 = semget$private(0x0, 0x20000000102, 0x0) semop(r0, &(0x7f00000000c0)=[{0x0, 0x7fff}], 0x1) semop(r0, &(0x7f0000000000)=[{0x2}, {0x0, 0x1}], 0x2) 04:25:14 executing program 3: r0 = socket(0xa, 0x3, 0x1) getsockopt$inet6_opts(r0, 0x29, 0x3a, 0x0, &(0x7f0000000140)) 04:25:14 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@rand_addr=' \x01\x00', @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x10, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x6c}, 0x0, @in=@multicast2}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 36.800051][ T24] audit: type=1400 audit(1628223914.771:10): avc: denied { ingress } for pid=4924 comm="syz-executor.2" saddr=::1 daddr=::1 netif=lo scontext=system_u:object_r:cron_spool_t:s0 tcontext=system_u:object_r:netif_t:s0 tclass=netif permissive=1 [ 36.827000][ T24] audit: type=1400 audit(1628223914.771:11): avc: denied { recvfrom } for pid=4924 comm="syz-executor.2" saddr=::1 daddr=::1 netif=lo scontext=system_u:object_r:cron_spool_t:s0 tcontext=system_u:object_r:node_t:s0 tclass=node permissive=1 [ 36.850198][ T24] audit: type=1400 audit(1628223914.771:12): avc: denied { recv } for pid=4924 comm="syz-executor.2" saddr=::1 daddr=::1 netif=lo scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cron_spool_t:s0 tclass=peer permissive=1 04:25:14 executing program 4: r0 = semget$private(0x0, 0x20000000102, 0x0) semop(r0, &(0x7f00000000c0)=[{0x0, 0x7fff}], 0x1) semop(r0, &(0x7f0000000000)=[{0x2}, {0x0, 0x1}], 0x2) 04:25:14 executing program 3: r0 = socket(0xa, 0x3, 0x1) getsockopt$inet6_opts(r0, 0x29, 0x3a, 0x0, &(0x7f0000000140)) 04:25:14 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@rand_addr=' \x01\x00', @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x10, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x6c}, 0x0, @in=@multicast2}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:25:14 executing program 4: r0 = semget$private(0x0, 0x20000000102, 0x0) semop(r0, &(0x7f00000000c0)=[{0x0, 0x7fff}], 0x1) semop(r0, &(0x7f0000000000)=[{0x2}, {0x0, 0x1}], 0x2) 04:25:15 executing program 5: futex(&(0x7f0000000000)=0x2, 0x8b, 0x2, 0x0, 0x0, 0x0) futex(&(0x7f0000000000), 0x81, 0x0, 0x0, 0x0, 0x0) 04:25:15 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) r2 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) io_submit(r5, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f00000002c0)="da", 0x1}]) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r3, r6, 0x0, 0x8400fffffffb) sendfile(r2, r2, 0x0, 0x8080ffffff80) 04:25:15 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@rand_addr=' \x01\x00', @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x10, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x6c}, 0x0, @in=@multicast2}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:25:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x18, r2, 0xb15, 0x0, 0x0, {0x17}, [@HEADER={0x4}]}, 0x18}}, 0x0) 04:25:15 executing program 4: r0 = semget$private(0x0, 0x20000000102, 0x0) semop(r0, &(0x7f00000000c0)=[{0x0, 0x7fff}], 0x1) semop(r0, &(0x7f0000000000)=[{0x2}, {0x0, 0x1}], 0x2) 04:25:15 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@rand_addr=' \x01\x00', @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x10, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x6c}, 0x0, @in=@multicast2}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:25:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x18, r2, 0xb15, 0x0, 0x0, {0x17}, [@HEADER={0x4}]}, 0x18}}, 0x0) 04:25:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x18, r2, 0xb15, 0x0, 0x0, {0x17}, [@HEADER={0x4}]}, 0x18}}, 0x0) 04:25:15 executing program 4: futex(&(0x7f0000000000)=0x2, 0x8b, 0x2, 0x0, 0x0, 0x0) futex(&(0x7f0000000000), 0x81, 0x0, 0x0, 0x0, 0x0) 04:25:15 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@rand_addr=' \x01\x00', @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x10, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x6c}, 0x0, @in=@multicast2}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:25:15 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@rand_addr=' \x01\x00', @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x10, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x6c}, 0x0, @in=@multicast2}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:25:15 executing program 1: r0 = syz_io_uring_setup(0x6e4, &(0x7f0000000080), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000656000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000040)=0x0) r3 = socket(0x840000000002, 0x3, 0xff) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, &(0x7f00000001c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) io_uring_enter(r0, 0x393c, 0x0, 0x0, 0x0, 0x0) [ 38.201477][ T5009] ================================================================== [ 38.209575][ T5009] BUG: KCSAN: data-race in __add_to_page_cache_locked / ext4_writepages [ 38.217934][ T5009] [ 38.220243][ T5009] write to 0xffff888106dd3d60 of 8 bytes by task 5008 on cpu 0: [ 38.227859][ T5009] __add_to_page_cache_locked+0x256/0x4b0 [ 38.233577][ T5009] add_to_page_cache_lru+0xa0/0x1b0 [ 38.238771][ T5009] pagecache_get_page+0x6a3/0x900 [ 38.243783][ T5009] grab_cache_page_write_begin+0x3f/0x70 [ 38.249408][ T5009] ext4_da_write_begin+0x305/0x820 [ 38.254507][ T5009] generic_perform_write+0x196/0x3c0 [ 38.259778][ T5009] ext4_buffered_write_iter+0x2f2/0x3f0 [ 38.265316][ T5009] ext4_file_write_iter+0x2e7/0x11d0 [ 38.270589][ T5009] do_iter_readv_writev+0x2cb/0x360 [ 38.275770][ T5009] do_iter_write+0x112/0x4c0 [ 38.280348][ T5009] vfs_iter_write+0x4c/0x70 [ 38.284841][ T5009] iter_file_splice_write+0x40a/0x750 [ 38.290204][ T5009] direct_splice_actor+0x80/0xa0 [ 38.295132][ T5009] splice_direct_to_actor+0x345/0x650 [ 38.300490][ T5009] do_splice_direct+0xf5/0x170 [ 38.305247][ T5009] do_sendfile+0x773/0xda0 [ 38.309656][ T5009] __x64_sys_sendfile64+0xf2/0x130 [ 38.314765][ T5009] do_syscall_64+0x3d/0x90 [ 38.319169][ T5009] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 38.325048][ T5009] [ 38.327357][ T5009] read to 0xffff888106dd3d60 of 8 bytes by task 5009 on cpu 1: [ 38.334881][ T5009] ext4_writepages+0x111/0x1d10 [ 38.339738][ T5009] do_writepages+0x7b/0x150 [ 38.344226][ T5009] file_write_and_wait_range+0x180/0x210 [ 38.349844][ T5009] ext4_sync_file+0x105/0x670 [ 38.354517][ T5009] vfs_fsync_range+0x107/0x120 [ 38.359274][ T5009] ext4_buffered_write_iter+0x39c/0x3f0 [ 38.364803][ T5009] ext4_file_write_iter+0x2e7/0x11d0 [ 38.370075][ T5009] do_iter_readv_writev+0x2cb/0x360 [ 38.375287][ T5009] do_iter_write+0x112/0x4c0 [ 38.379880][ T5009] vfs_iter_write+0x4c/0x70 [ 38.384373][ T5009] iter_file_splice_write+0x40a/0x750 [ 38.389731][ T5009] direct_splice_actor+0x80/0xa0 [ 38.394668][ T5009] splice_direct_to_actor+0x345/0x650 [ 38.400038][ T5009] do_splice_direct+0xf5/0x170 [ 38.404800][ T5009] do_sendfile+0x773/0xda0 [ 38.409200][ T5009] __x64_sys_sendfile64+0xf2/0x130 [ 38.414393][ T5009] do_syscall_64+0x3d/0x90 [ 38.418791][ T5009] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 38.424677][ T5009] [ 38.426984][ T5009] value changed: 0x000000000000207d -> 0x000000000000207e [ 38.434072][ T5009] [ 38.436379][ T5009] Reported by Kernel Concurrency Sanitizer on: [ 38.442508][ T5009] CPU: 1 PID: 5009 Comm: syz-executor.0 Not tainted 5.14.0-rc4-syzkaller #0 04:25:16 executing program 5: futex(&(0x7f0000000000)=0x2, 0x8b, 0x2, 0x0, 0x0, 0x0) futex(&(0x7f0000000000), 0x81, 0x0, 0x0, 0x0, 0x0) [ 38.451266][ T5009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 38.461305][ T5009] ================================================================== 04:25:17 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) r2 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) io_submit(r5, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f00000002c0)="da", 0x1}]) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r3, r6, 0x0, 0x8400fffffffb) sendfile(r2, r2, 0x0, 0x8080ffffff80) 04:25:17 executing program 1: r0 = syz_io_uring_setup(0x6e4, &(0x7f0000000080), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000656000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000040)=0x0) r3 = socket(0x840000000002, 0x3, 0xff) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, &(0x7f00000001c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) io_uring_enter(r0, 0x393c, 0x0, 0x0, 0x0, 0x0) 04:25:17 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@rand_addr=' \x01\x00', @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x10, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x6c}, 0x0, @in=@multicast2}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:25:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) open$dir(&(0x7f0000000340)='./file0/bus\x00', 0xc840, 0x0) acct(&(0x7f0000000000)='./file0/bus\x00') clone(0x20026004dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7efbb, 0x0) 04:25:17 executing program 4: futex(&(0x7f0000000000)=0x2, 0x8b, 0x2, 0x0, 0x0, 0x0) futex(&(0x7f0000000000), 0x81, 0x0, 0x0, 0x0, 0x0) 04:25:17 executing program 1: r0 = syz_io_uring_setup(0x6e4, &(0x7f0000000080), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000656000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000040)=0x0) r3 = socket(0x840000000002, 0x3, 0xff) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, &(0x7f00000001c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) io_uring_enter(r0, 0x393c, 0x0, 0x0, 0x0, 0x0) [ 39.218055][ T5026] Process accounting resumed 04:25:17 executing program 1: r0 = syz_io_uring_setup(0x6e4, &(0x7f0000000080), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000656000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000040)=0x0) r3 = socket(0x840000000002, 0x3, 0xff) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, &(0x7f00000001c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) io_uring_enter(r0, 0x393c, 0x0, 0x0, 0x0, 0x0) 04:25:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) open$dir(&(0x7f0000000340)='./file0/bus\x00', 0xc840, 0x0) acct(&(0x7f0000000000)='./file0/bus\x00') clone(0x20026004dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7efbb, 0x0) [ 39.244120][ T5031] Process accounting resumed 04:25:17 executing program 1: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x81, &(0x7f0000000280)="8d31e183156939000000e28c0b1dd2a357b264c8745b78376e18cd3d3dfcb946cf885a21539a0c4a081ceeb24ac13830c1beaa1b4dc69190f8d2802fab69347b9a915308c4820500000000000000b2965cd7e1292aaa6375f1ea922e594a37c9686d403d3a82d09ec2e57d3c3eb25cc990e97660c2117496b2dd4837334f73c37e"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f0000000140)) 04:25:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) open$dir(&(0x7f0000000340)='./file0/bus\x00', 0xc840, 0x0) acct(&(0x7f0000000000)='./file0/bus\x00') clone(0x20026004dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7efbb, 0x0) 04:25:17 executing program 3: connect(0xffffffffffffffff, 0x0, 0x0) [ 39.292818][ T5040] Process accounting resumed 04:25:17 executing program 5: futex(&(0x7f0000000000)=0x2, 0x8b, 0x2, 0x0, 0x0, 0x0) futex(&(0x7f0000000000), 0x81, 0x0, 0x0, 0x0, 0x0) [ 39.368764][ T5058] Process accounting resumed [ 39.736045][ T5071] ================================================================== [ 39.744139][ T5071] BUG: KCSAN: data-race in __add_to_page_cache_locked / file_write_and_wait_range [ 39.753341][ T5071] [ 39.755659][ T5071] write to 0xffff888106e0a870 of 8 bytes by task 5070 on cpu 0: [ 39.763273][ T5071] __add_to_page_cache_locked+0x256/0x4b0 [ 39.768985][ T5071] add_to_page_cache_lru+0xa0/0x1b0 [ 39.774175][ T5071] pagecache_get_page+0x6a3/0x900 [ 39.779196][ T5071] grab_cache_page_write_begin+0x3f/0x70 [ 39.784827][ T5071] ext4_da_write_begin+0x305/0x820 [ 39.789928][ T5071] generic_perform_write+0x196/0x3c0 [ 39.795205][ T5071] ext4_buffered_write_iter+0x2f2/0x3f0 [ 39.800768][ T5071] ext4_file_write_iter+0x2e7/0x11d0 [ 39.806061][ T5071] do_iter_readv_writev+0x2cb/0x360 [ 39.811251][ T5071] do_iter_write+0x112/0x4c0 [ 39.815849][ T5071] vfs_iter_write+0x4c/0x70 [ 39.820345][ T5071] iter_file_splice_write+0x40a/0x750 [ 39.825708][ T5071] direct_splice_actor+0x80/0xa0 [ 39.830638][ T5071] splice_direct_to_actor+0x345/0x650 [ 39.836000][ T5071] do_splice_direct+0xf5/0x170 [ 39.840754][ T5071] do_sendfile+0x773/0xda0 [ 39.845250][ T5071] __x64_sys_sendfile64+0xf2/0x130 [ 39.850349][ T5071] do_syscall_64+0x3d/0x90 [ 39.854756][ T5071] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 39.860634][ T5071] [ 39.862960][ T5071] read to 0xffff888106e0a870 of 8 bytes by task 5071 on cpu 1: [ 39.870480][ T5071] file_write_and_wait_range+0x48/0x210 [ 39.876021][ T5071] ext4_sync_file+0x105/0x670 [ 39.880687][ T5071] vfs_fsync_range+0x107/0x120 [ 39.885446][ T5071] ext4_buffered_write_iter+0x39c/0x3f0 [ 39.890977][ T5071] ext4_file_write_iter+0x2e7/0x11d0 [ 39.896254][ T5071] do_iter_readv_writev+0x2cb/0x360 [ 39.901440][ T5071] do_iter_write+0x112/0x4c0 [ 39.906014][ T5071] vfs_iter_write+0x4c/0x70 [ 39.910500][ T5071] iter_file_splice_write+0x40a/0x750 [ 39.915869][ T5071] direct_splice_actor+0x80/0xa0 [ 39.920793][ T5071] splice_direct_to_actor+0x345/0x650 [ 39.926151][ T5071] do_splice_direct+0xf5/0x170 [ 39.930907][ T5071] do_sendfile+0x773/0xda0 [ 39.935317][ T5071] __x64_sys_sendfile64+0xf2/0x130 [ 39.940411][ T5071] do_syscall_64+0x3d/0x90 [ 39.944817][ T5071] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 39.950698][ T5071] [ 39.952999][ T5071] value changed: 0x0000000000001a7e -> 0x0000000000001a80 [ 39.960865][ T5071] [ 39.963171][ T5071] Reported by Kernel Concurrency Sanitizer on: [ 39.969304][ T5071] CPU: 1 PID: 5071 Comm: syz-executor.0 Not tainted 5.14.0-rc4-syzkaller #0 [ 39.977966][ T5071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 39.988008][ T5071] ================================================================== 04:25:18 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) r2 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) io_submit(r5, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f00000002c0)="da", 0x1}]) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r3, r6, 0x0, 0x8400fffffffb) sendfile(r2, r2, 0x0, 0x8080ffffff80) 04:25:18 executing program 1: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x81, &(0x7f0000000280)="8d31e183156939000000e28c0b1dd2a357b264c8745b78376e18cd3d3dfcb946cf885a21539a0c4a081ceeb24ac13830c1beaa1b4dc69190f8d2802fab69347b9a915308c4820500000000000000b2965cd7e1292aaa6375f1ea922e594a37c9686d403d3a82d09ec2e57d3c3eb25cc990e97660c2117496b2dd4837334f73c37e"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f0000000140)) 04:25:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x1, 0x35) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000180)={0x0, {{0xa, 0x0, @multicast2}}}, 0x90) 04:25:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) open$dir(&(0x7f0000000340)='./file0/bus\x00', 0xc840, 0x0) acct(&(0x7f0000000000)='./file0/bus\x00') clone(0x20026004dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7efbb, 0x0) 04:25:18 executing program 4: futex(&(0x7f0000000000)=0x2, 0x8b, 0x2, 0x0, 0x0, 0x0) futex(&(0x7f0000000000), 0x81, 0x0, 0x0, 0x0, 0x0) 04:25:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x14, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) 04:25:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x1, 0x35) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000180)={0x0, {{0xa, 0x0, @multicast2}}}, 0x90) 04:25:18 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x10, 0x0, 0x0, 0x18, 0xb, 0x48}}) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) [ 40.806296][ T5080] Process accounting resumed 04:25:18 executing program 1: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x81, &(0x7f0000000280)="8d31e183156939000000e28c0b1dd2a357b264c8745b78376e18cd3d3dfcb946cf885a21539a0c4a081ceeb24ac13830c1beaa1b4dc69190f8d2802fab69347b9a915308c4820500000000000000b2965cd7e1292aaa6375f1ea922e594a37c9686d403d3a82d09ec2e57d3c3eb25cc990e97660c2117496b2dd4837334f73c37e"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f0000000140)) 04:25:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x14, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) 04:25:18 executing program 1: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x81, &(0x7f0000000280)="8d31e183156939000000e28c0b1dd2a357b264c8745b78376e18cd3d3dfcb946cf885a21539a0c4a081ceeb24ac13830c1beaa1b4dc69190f8d2802fab69347b9a915308c4820500000000000000b2965cd7e1292aaa6375f1ea922e594a37c9686d403d3a82d09ec2e57d3c3eb25cc990e97660c2117496b2dd4837334f73c37e"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f0000000140)) 04:25:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x1, 0x35) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000180)={0x0, {{0xa, 0x0, @multicast2}}}, 0x90) 04:25:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x14, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) 04:25:20 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x10, 0x0, 0x0, 0x18, 0xb, 0x48}}) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) 04:25:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x1, 0x35) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000180)={0x0, {{0xa, 0x0, @multicast2}}}, 0x90) 04:25:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x14, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) 04:25:20 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x10, 0x0, 0x0, 0x18, 0xb, 0x48}}) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) 04:25:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000000280)) fcntl$lock(r0, 0x7, &(0x7f0000000140)={0x1, 0x0, 0x1}) fcntl$lock(r0, 0x6, &(0x7f0000000080)={0x0, 0x0, 0x2}) 04:25:20 executing program 3: openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) pselect6(0x40, &(0x7f0000000340)={0x8}, 0x0, 0x0, &(0x7f0000000480), 0x0) 04:25:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x14, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) 04:25:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x14, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) 04:25:20 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x10, 0x0, 0x0, 0x18, 0xb, 0x48}}) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) 04:25:20 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x10, 0x0, 0x0, 0x18, 0xb, 0x48}}) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) 04:25:20 executing program 3: openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) pselect6(0x40, &(0x7f0000000340)={0x8}, 0x0, 0x0, &(0x7f0000000480), 0x0) 04:25:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x14, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) 04:25:20 executing program 5: ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000180)={0x0, "2ba32d9f81f20f2ec713547b5cbfcd3b"}) unshare(0x20000600) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000000140), 0x4) 04:25:20 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x10, 0x0, 0x0, 0x18, 0xb, 0x48}}) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) 04:25:20 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x10, 0x0, 0x0, 0x18, 0xb, 0x48}}) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) 04:25:20 executing program 3: openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) pselect6(0x40, &(0x7f0000000340)={0x8}, 0x0, 0x0, &(0x7f0000000480), 0x0) 04:25:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000000280)) fcntl$lock(r0, 0x7, &(0x7f0000000140)={0x1, 0x0, 0x1}) fcntl$lock(r0, 0x6, &(0x7f0000000080)={0x0, 0x0, 0x2}) 04:25:20 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x14, 0x18, 0x6b4e12c8a09f3155, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) 04:25:20 executing program 5: ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000180)={0x0, "2ba32d9f81f20f2ec713547b5cbfcd3b"}) unshare(0x20000600) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000000140), 0x4) 04:25:20 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregset(0x4204, 0x0, 0x0, &(0x7f0000000080)={0x0}) ptrace$setsig(0x4203, r1, 0x0, &(0x7f0000000040)={0x13, 0x0, 0x9}) 04:25:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_create(0x3, 0x0, &(0x7f0000000480)) timer_gettime(0x0, &(0x7f00000004c0)) 04:25:20 executing program 3: openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) pselect6(0x40, &(0x7f0000000340)={0x8}, 0x0, 0x0, &(0x7f0000000480), 0x0) 04:25:20 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregset(0x4204, 0x0, 0x0, &(0x7f0000000080)={0x0}) ptrace$setsig(0x4203, r1, 0x0, &(0x7f0000000040)={0x13, 0x0, 0x9}) 04:25:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_create(0x3, 0x0, &(0x7f0000000480)) timer_gettime(0x0, &(0x7f00000004c0)) 04:25:20 executing program 5: ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000180)={0x0, "2ba32d9f81f20f2ec713547b5cbfcd3b"}) unshare(0x20000600) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000000140), 0x4) 04:25:20 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x14, 0x18, 0x6b4e12c8a09f3155, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) 04:25:20 executing program 3: r0 = socket(0x1000000000000010, 0x3, 0x0) write(r0, &(0x7f0000000100)="240000005a000100a0660000000000000a04f511080001000200000004b2028001000000", 0x24) 04:25:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000000280)) fcntl$lock(r0, 0x7, &(0x7f0000000140)={0x1, 0x0, 0x1}) fcntl$lock(r0, 0x6, &(0x7f0000000080)={0x0, 0x0, 0x2}) 04:25:20 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregset(0x4204, 0x0, 0x0, &(0x7f0000000080)={0x0}) ptrace$setsig(0x4203, r1, 0x0, &(0x7f0000000040)={0x13, 0x0, 0x9}) 04:25:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_create(0x3, 0x0, &(0x7f0000000480)) timer_gettime(0x0, &(0x7f00000004c0)) 04:25:20 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x14, 0x18, 0x6b4e12c8a09f3155, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) 04:25:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000000280)) fcntl$lock(r0, 0x7, &(0x7f0000000140)={0x1, 0x0, 0x1}) fcntl$lock(r0, 0x6, &(0x7f0000000080)={0x0, 0x0, 0x2}) 04:25:20 executing program 5: ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000180)={0x0, "2ba32d9f81f20f2ec713547b5cbfcd3b"}) unshare(0x20000600) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000000140), 0x4) 04:25:20 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregset(0x4204, 0x0, 0x0, &(0x7f0000000080)={0x0}) ptrace$setsig(0x4203, r1, 0x0, &(0x7f0000000040)={0x13, 0x0, 0x9}) 04:25:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_create(0x3, 0x0, &(0x7f0000000480)) timer_gettime(0x0, &(0x7f00000004c0)) [ 42.440668][ T5208] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 04:25:20 executing program 3: r0 = socket(0x1000000000000010, 0x3, 0x0) write(r0, &(0x7f0000000100)="240000005a000100a0660000000000000a04f511080001000200000004b2028001000000", 0x24) 04:25:20 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x14, 0x18, 0x6b4e12c8a09f3155, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) 04:25:20 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) 04:25:20 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSETSW2(r0, 0x5420, 0x0) 04:25:20 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000740)=[{&(0x7f0000000240)=""/166, 0xa6}], 0x1, &(0x7f0000000e00)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 04:25:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='devtmpfs\x00', 0x0, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) getdents(r1, &(0x7f0000000340)=""/157, 0x200003dd) 04:25:20 executing program 4: r0 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x100000000a, &(0x7f00000003c0)=0x800000001, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x404c004, &(0x7f0000000180)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:25:20 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSETSW2(r0, 0x5420, 0x0) [ 42.551861][ T5232] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 04:25:20 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) 04:25:20 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000740)=[{&(0x7f0000000240)=""/166, 0xa6}], 0x1, &(0x7f0000000e00)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 04:25:20 executing program 3: r0 = socket(0x1000000000000010, 0x3, 0x0) write(r0, &(0x7f0000000100)="240000005a000100a0660000000000000a04f511080001000200000004b2028001000000", 0x24) 04:25:20 executing program 4: r0 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x100000000a, &(0x7f00000003c0)=0x800000001, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x404c004, &(0x7f0000000180)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:25:20 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSETSW2(r0, 0x5420, 0x0) 04:25:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='devtmpfs\x00', 0x0, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) getdents(r1, &(0x7f0000000340)=""/157, 0x200003dd) 04:25:20 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) 04:25:20 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000740)=[{&(0x7f0000000240)=""/166, 0xa6}], 0x1, &(0x7f0000000e00)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 04:25:20 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSETSW2(r0, 0x5420, 0x0) 04:25:20 executing program 4: r0 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x100000000a, &(0x7f00000003c0)=0x800000001, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x404c004, &(0x7f0000000180)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:25:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='devtmpfs\x00', 0x0, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) getdents(r1, &(0x7f0000000340)=""/157, 0x200003dd) [ 42.679840][ T5268] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 04:25:20 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) 04:25:20 executing program 3: r0 = socket(0x1000000000000010, 0x3, 0x0) write(r0, &(0x7f0000000100)="240000005a000100a0660000000000000a04f511080001000200000004b2028001000000", 0x24) 04:25:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='devtmpfs\x00', 0x0, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) getdents(r1, &(0x7f0000000340)=""/157, 0x200003dd) 04:25:20 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000740)=[{&(0x7f0000000240)=""/166, 0xa6}], 0x1, &(0x7f0000000e00)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 04:25:20 executing program 4: r0 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x100000000a, &(0x7f00000003c0)=0x800000001, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x404c004, &(0x7f0000000180)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:25:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='devtmpfs\x00', 0x0, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) getdents(r1, &(0x7f0000000340)=""/157, 0x200003dd) 04:25:20 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x8ec3, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, 0x0, 0x65) splice(r3, 0x0, r5, 0x0, 0x2000000001c, 0x0) vmsplice(r4, &(0x7f0000000140)=[{&(0x7f0000000000)="dd", 0x1}], 0x1, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 04:25:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='devtmpfs\x00', 0x0, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) getdents(r1, &(0x7f0000000340)=""/157, 0x200003dd) 04:25:20 executing program 1: io_setup(0x8dc, &(0x7f0000000280)=0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) io_submit(r0, 0x4137, &(0x7f0000000400)=[&(0x7f0000000040)={0xfffffffffffffdef, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) io_cancel(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 04:25:20 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fff0001}]}) setregid(0x0, 0x0) [ 42.794790][ T5293] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 04:25:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x60) close(r1) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r4 = gettid() tkill(r4, 0x1000000000016) 04:25:20 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x401}, 0x1c) recvmmsg(r1, &(0x7f0000000080), 0x21e, 0x40010002, 0x0) io_setup(0x2, &(0x7f0000000140)=0x0) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x12f}]) 04:25:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='devtmpfs\x00', 0x0, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) getdents(r1, &(0x7f0000000340)=""/157, 0x200003dd) 04:25:20 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fff0001}]}) setregid(0x0, 0x0) 04:25:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockopt$netlink(r0, 0x10e, 0x4, 0x0, &(0x7f0000000040)) 04:25:20 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fff0001}]}) setregid(0x0, 0x0) 04:25:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockopt$netlink(r0, 0x10e, 0x4, 0x0, &(0x7f0000000040)) 04:25:20 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fff0001}]}) setregid(0x0, 0x0) 04:25:21 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x8ec3, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, 0x0, 0x65) splice(r3, 0x0, r5, 0x0, 0x2000000001c, 0x0) vmsplice(r4, &(0x7f0000000140)=[{&(0x7f0000000000)="dd", 0x1}], 0x1, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 04:25:21 executing program 1: io_setup(0x8dc, &(0x7f0000000280)=0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) io_submit(r0, 0x4137, &(0x7f0000000400)=[&(0x7f0000000040)={0xfffffffffffffdef, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) io_cancel(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 04:25:21 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x401}, 0x1c) recvmmsg(r1, &(0x7f0000000080), 0x21e, 0x40010002, 0x0) io_setup(0x2, &(0x7f0000000140)=0x0) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x12f}]) 04:25:21 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockopt$netlink(r0, 0x10e, 0x4, 0x0, &(0x7f0000000040)) 04:25:21 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x401}, 0x1c) recvmmsg(r1, &(0x7f0000000080), 0x21e, 0x40010002, 0x0) io_setup(0x2, &(0x7f0000000140)=0x0) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x12f}]) 04:25:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x60) close(r1) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r4 = gettid() tkill(r4, 0x1000000000016) 04:25:21 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockopt$netlink(r0, 0x10e, 0x4, 0x0, &(0x7f0000000040)) 04:25:21 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x8ec3, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, 0x0, 0x65) splice(r3, 0x0, r5, 0x0, 0x2000000001c, 0x0) vmsplice(r4, &(0x7f0000000140)=[{&(0x7f0000000000)="dd", 0x1}], 0x1, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 04:25:21 executing program 1: io_setup(0x8dc, &(0x7f0000000280)=0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) io_submit(r0, 0x4137, &(0x7f0000000400)=[&(0x7f0000000040)={0xfffffffffffffdef, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) io_cancel(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 04:25:21 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x401}, 0x1c) recvmmsg(r1, &(0x7f0000000080), 0x21e, 0x40010002, 0x0) io_setup(0x2, &(0x7f0000000140)=0x0) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x12f}]) 04:25:21 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x401}, 0x1c) recvmmsg(r1, &(0x7f0000000080), 0x21e, 0x40010002, 0x0) io_setup(0x2, &(0x7f0000000140)=0x0) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x12f}]) 04:25:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x60) close(r1) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r4 = gettid() tkill(r4, 0x1000000000016) 04:25:21 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x8ec3, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, 0x0, 0x65) splice(r3, 0x0, r5, 0x0, 0x2000000001c, 0x0) vmsplice(r4, &(0x7f0000000140)=[{&(0x7f0000000000)="dd", 0x1}], 0x1, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 04:25:21 executing program 1: io_setup(0x8dc, &(0x7f0000000280)=0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) io_submit(r0, 0x4137, &(0x7f0000000400)=[&(0x7f0000000040)={0xfffffffffffffdef, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) io_cancel(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 04:25:21 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x401}, 0x1c) recvmmsg(r1, &(0x7f0000000080), 0x21e, 0x40010002, 0x0) io_setup(0x2, &(0x7f0000000140)=0x0) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x12f}]) 04:25:21 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x401}, 0x1c) recvmmsg(r1, &(0x7f0000000080), 0x21e, 0x40010002, 0x0) io_setup(0x2, &(0x7f0000000140)=0x0) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x12f}]) 04:25:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x60) close(r1) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r4 = gettid() tkill(r4, 0x1000000000016) 04:25:21 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x8ec3, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, 0x0, 0x65) splice(r3, 0x0, r5, 0x0, 0x2000000001c, 0x0) vmsplice(r4, &(0x7f0000000140)=[{&(0x7f0000000000)="dd", 0x1}], 0x1, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 04:25:21 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x8ec3, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, 0x0, 0x65) splice(r3, 0x0, r5, 0x0, 0x2000000001c, 0x0) vmsplice(r4, &(0x7f0000000140)=[{&(0x7f0000000000)="dd", 0x1}], 0x1, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 04:25:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x60) close(r1) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r4 = gettid() tkill(r4, 0x1000000000016) 04:25:21 executing program 2: io_setup(0x8dc, &(0x7f0000000280)=0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) io_submit(r0, 0x4137, &(0x7f0000000400)=[&(0x7f0000000040)={0xfffffffffffffdef, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) io_cancel(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 04:25:21 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sysvipc/sem\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001b00)=[{&(0x7f0000001740)=""/108, 0x6c}, {&(0x7f00000017c0)=""/95, 0x5f}, {&(0x7f0000001840)=""/104, 0x68}, {&(0x7f00000018c0)=""/235, 0xeb}, {&(0x7f00000019c0)=""/178, 0xb2}, {&(0x7f00000000c0)=""/41, 0x29}], 0x6, 0x4, 0x0) 04:25:21 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sysvipc/sem\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001b00)=[{&(0x7f0000001740)=""/108, 0x6c}, {&(0x7f00000017c0)=""/95, 0x5f}, {&(0x7f0000001840)=""/104, 0x68}, {&(0x7f00000018c0)=""/235, 0xeb}, {&(0x7f00000019c0)=""/178, 0xb2}, {&(0x7f00000000c0)=""/41, 0x29}], 0x6, 0x4, 0x0) 04:25:21 executing program 2: io_setup(0x8dc, &(0x7f0000000280)=0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) io_submit(r0, 0x4137, &(0x7f0000000400)=[&(0x7f0000000040)={0xfffffffffffffdef, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) io_cancel(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 04:25:21 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x8ec3, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, 0x0, 0x65) splice(r3, 0x0, r5, 0x0, 0x2000000001c, 0x0) vmsplice(r4, &(0x7f0000000140)=[{&(0x7f0000000000)="dd", 0x1}], 0x1, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 04:25:21 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sysvipc/sem\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001b00)=[{&(0x7f0000001740)=""/108, 0x6c}, {&(0x7f00000017c0)=""/95, 0x5f}, {&(0x7f0000001840)=""/104, 0x68}, {&(0x7f00000018c0)=""/235, 0xeb}, {&(0x7f00000019c0)=""/178, 0xb2}, {&(0x7f00000000c0)=""/41, 0x29}], 0x6, 0x4, 0x0) 04:25:21 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sysvipc/sem\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001b00)=[{&(0x7f0000001740)=""/108, 0x6c}, {&(0x7f00000017c0)=""/95, 0x5f}, {&(0x7f0000001840)=""/104, 0x68}, {&(0x7f00000018c0)=""/235, 0xeb}, {&(0x7f00000019c0)=""/178, 0xb2}, {&(0x7f00000000c0)=""/41, 0x29}], 0x6, 0x4, 0x0) 04:25:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x60) close(r1) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r4 = gettid() tkill(r4, 0x1000000000016) 04:25:21 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x8ec3, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, 0x0, 0x65) splice(r3, 0x0, r5, 0x0, 0x2000000001c, 0x0) vmsplice(r4, &(0x7f0000000140)=[{&(0x7f0000000000)="dd", 0x1}], 0x1, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 04:25:21 executing program 2: io_setup(0x8dc, &(0x7f0000000280)=0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) io_submit(r0, 0x4137, &(0x7f0000000400)=[&(0x7f0000000040)={0xfffffffffffffdef, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) io_cancel(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 04:25:21 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x8ec3, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, 0x0, 0x65) splice(r3, 0x0, r5, 0x0, 0x2000000001c, 0x0) vmsplice(r4, &(0x7f0000000140)=[{&(0x7f0000000000)="dd", 0x1}], 0x1, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 04:25:21 executing program 3: r0 = getpgrp(0x0) rt_tgsigqueueinfo(r0, r0, 0x1d, &(0x7f0000000400)={0x0, 0x0, 0x5}) 04:25:21 executing program 3: set_mempolicy(0x2, &(0x7f00000001c0)=0x401, 0x8) keyctl$session_to_parent(0x12) 04:25:21 executing program 3: set_mempolicy(0x2, &(0x7f00000001c0)=0x401, 0x8) keyctl$session_to_parent(0x12) 04:25:21 executing program 3: set_mempolicy(0x2, &(0x7f00000001c0)=0x401, 0x8) keyctl$session_to_parent(0x12) 04:25:21 executing program 3: set_mempolicy(0x2, &(0x7f00000001c0)=0x401, 0x8) keyctl$session_to_parent(0x12) 04:25:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x60) close(r1) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r4 = gettid() tkill(r4, 0x1000000000016) 04:25:21 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0xffffffffffffff9b}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 04:25:21 executing program 3: setpriority(0x1, 0xffffffffffffffff, 0x0) 04:25:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffffff4}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="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", 0x12f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 04:25:21 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x8ec3, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, 0x0, 0x65) splice(r3, 0x0, r5, 0x0, 0x2000000001c, 0x0) vmsplice(r4, &(0x7f0000000140)=[{&(0x7f0000000000)="dd", 0x1}], 0x1, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 04:25:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffffff4}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="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", 0x12f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 04:25:21 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) chroot(&(0x7f00000003c0)='./file0/../file0\x00') mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f0000000240)='./file0/../file0\x00', 0x2) pivot_root(&(0x7f0000000040)='./file0/../file0/file0\x00', &(0x7f0000000080)='./file0/../file0\x00') [ 43.854024][ T24] audit: type=1326 audit(1628223921.822:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5534 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7ffc0000 04:25:21 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write(0xffffffffffffffff, &(0x7f0000000000)="240000001e006700", 0x8) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f00000000c0)={0x200007ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000000)="1c0000001a", 0x5) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe3, 0x0) 04:25:21 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0xffffffffffffff9b}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) [ 43.911775][ T24] audit: type=1326 audit(1628223921.822:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5534 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7ffc0000 04:25:21 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) chroot(&(0x7f00000003c0)='./file0/../file0\x00') mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f0000000240)='./file0/../file0\x00', 0x2) pivot_root(&(0x7f0000000040)='./file0/../file0/file0\x00', &(0x7f0000000080)='./file0/../file0\x00') 04:25:21 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) chroot(&(0x7f00000003c0)='./file0/../file0\x00') mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f0000000240)='./file0/../file0\x00', 0x2) pivot_root(&(0x7f0000000040)='./file0/../file0/file0\x00', &(0x7f0000000080)='./file0/../file0\x00') [ 43.963804][ T24] audit: type=1326 audit(1628223921.862:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5534 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=56 compat=0 ip=0x4665e9 code=0x7ffc0000 04:25:22 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffffff4}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="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", 0x12f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 44.002455][ T24] audit: type=1326 audit(1628223921.862:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5534 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7ffc0000 04:25:22 executing program 4: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) chroot(&(0x7f00000003c0)='./file0/../file0\x00') mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f0000000240)='./file0/../file0\x00', 0x2) pivot_root(&(0x7f0000000040)='./file0/../file0/file0\x00', &(0x7f0000000080)='./file0/../file0\x00') 04:25:22 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) chroot(&(0x7f00000003c0)='./file0/../file0\x00') mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f0000000240)='./file0/../file0\x00', 0x2) pivot_root(&(0x7f0000000040)='./file0/../file0/file0\x00', &(0x7f0000000080)='./file0/../file0\x00') [ 44.049621][ T24] audit: type=1326 audit(1628223921.862:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5534 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7ffc0000 04:25:22 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0xffffffffffffff9b}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 04:25:22 executing program 4: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) chroot(&(0x7f00000003c0)='./file0/../file0\x00') mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f0000000240)='./file0/../file0\x00', 0x2) pivot_root(&(0x7f0000000040)='./file0/../file0/file0\x00', &(0x7f0000000080)='./file0/../file0\x00') [ 44.097494][ T24] audit: type=1326 audit(1628223921.862:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5534 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=186 compat=0 ip=0x4665e9 code=0x7ffc0000 04:25:22 executing program 3: r0 = epoll_create1(0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) epoll_create1(0x0) fchmod(r0, 0x0) 04:25:22 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffffff4}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="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", 0x12f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 44.151578][ T24] audit: type=1326 audit(1628223921.862:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5534 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7ffc0000 [ 44.179898][ T24] audit: type=1326 audit(1628223921.862:20): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5534 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7ffc0000 04:25:22 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7c}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="ff1e5388ebe812456917ee"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) [ 44.219036][ T24] audit: type=1326 audit(1628223921.862:21): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5534 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=61 compat=0 ip=0x4665e9 code=0x7ffc0000 [ 44.251239][ T24] audit: type=1326 audit(1628223921.862:22): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5546 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7ffc0000 04:25:22 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write(0xffffffffffffffff, &(0x7f0000000000)="240000001e006700", 0x8) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f00000000c0)={0x200007ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000000)="1c0000001a", 0x5) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe3, 0x0) 04:25:22 executing program 4: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) chroot(&(0x7f00000003c0)='./file0/../file0\x00') mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f0000000240)='./file0/../file0\x00', 0x2) pivot_root(&(0x7f0000000040)='./file0/../file0/file0\x00', &(0x7f0000000080)='./file0/../file0\x00') 04:25:22 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7c}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="ff1e5388ebe812456917ee"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 04:25:22 executing program 3: r0 = epoll_create1(0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) epoll_create1(0x0) fchmod(r0, 0x0) 04:25:22 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x410000, 0x8, 0x210000, 0x8}, 0x1c) setsockopt$packet_int(r0, 0x107, 0x12, &(0x7f00000001c0), 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000340), 0x10) 04:25:22 executing program 3: r0 = epoll_create1(0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) epoll_create1(0x0) fchmod(r0, 0x0) 04:25:22 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7c}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="ff1e5388ebe812456917ee"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 04:25:25 executing program 3: r0 = epoll_create1(0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) epoll_create1(0x0) fchmod(r0, 0x0) 04:25:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890b, &(0x7f0000000280)={0x0, @l2tp={0x2, 0x0, @multicast2}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @tipc, 0x7}) 04:25:25 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write(0xffffffffffffffff, &(0x7f0000000000)="240000001e006700", 0x8) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f00000000c0)={0x200007ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000000)="1c0000001a", 0x5) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe3, 0x0) 04:25:25 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x410000, 0x8, 0x210000, 0x8}, 0x1c) setsockopt$packet_int(r0, 0x107, 0x12, &(0x7f00000001c0), 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000340), 0x10) 04:25:25 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7c}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="ff1e5388ebe812456917ee"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 04:25:25 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0xffffffffffffff9b}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 04:25:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890b, &(0x7f0000000280)={0x0, @l2tp={0x2, 0x0, @multicast2}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @tipc, 0x7}) 04:25:25 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x410000, 0x8, 0x210000, 0x8}, 0x1c) setsockopt$packet_int(r0, 0x107, 0x12, &(0x7f00000001c0), 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000340), 0x10) 04:25:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_buf(r0, 0x1, 0x4, 0x0, &(0x7f0000000100)) 04:25:25 executing program 2: get_mempolicy(0x0, 0xffffffffffffffff, 0xfffffffffffffffe, &(0x7f0000ffc000/0x4000)=nil, 0x2) 04:25:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890b, &(0x7f0000000280)={0x0, @l2tp={0x2, 0x0, @multicast2}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @tipc, 0x7}) 04:25:25 executing program 2: get_mempolicy(0x0, 0xffffffffffffffff, 0xfffffffffffffffe, &(0x7f0000ffc000/0x4000)=nil, 0x2) 04:25:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_buf(r0, 0x1, 0x4, 0x0, &(0x7f0000000100)) 04:25:25 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x410000, 0x8, 0x210000, 0x8}, 0x1c) setsockopt$packet_int(r0, 0x107, 0x12, &(0x7f00000001c0), 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000340), 0x10) 04:25:25 executing program 2: get_mempolicy(0x0, 0xffffffffffffffff, 0xfffffffffffffffe, &(0x7f0000ffc000/0x4000)=nil, 0x2) 04:25:25 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write(0xffffffffffffffff, &(0x7f0000000000)="240000001e006700", 0x8) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f00000000c0)={0x200007ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000000)="1c0000001a", 0x5) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe3, 0x0) 04:25:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890b, &(0x7f0000000280)={0x0, @l2tp={0x2, 0x0, @multicast2}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @tipc, 0x7}) 04:25:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_buf(r0, 0x1, 0x4, 0x0, &(0x7f0000000100)) 04:25:25 executing program 2: get_mempolicy(0x0, 0xffffffffffffffff, 0xfffffffffffffffe, &(0x7f0000ffc000/0x4000)=nil, 0x2) 04:25:25 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x410000, 0x8, 0x210000, 0x8}, 0x1c) setsockopt$packet_int(r0, 0x107, 0x12, &(0x7f00000001c0), 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000340), 0x10) 04:25:25 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x410000, 0x8, 0x210000, 0x8}, 0x1c) setsockopt$packet_int(r0, 0x107, 0x12, &(0x7f00000001c0), 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000340), 0x10) 04:25:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_buf(r0, 0x1, 0x4, 0x0, &(0x7f0000000100)) 04:25:26 executing program 4: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) 04:25:26 executing program 2: setresuid(0x0, 0xee01, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000600)={'wg0\x00'}) 04:25:26 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="8e0e9b48081b3e", 0x7}], 0x1) 04:25:26 executing program 4: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x65, 0x0, &(0x7f0000000040)) 04:25:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000940)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_REG_RULES={0xc, 0x22, 0x0, 0x1, [{0x4}, {0x8}]}, @NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'b\x00'}]}, 0x28}}, 0x0)