00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006180b3807460058800"/1079], 0x43e) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) openat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={0x4000, 0x6a, 0x34}, 0x18) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x640c00, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000000, 0x30, r1, 0x5f420000) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r2, r3) [ 702.551808][T20596] loop4: detected capacity change from 0 to 264192 07:18:14 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) [ 702.727874][T20596] hfsplus: unable to parse mount options 07:18:14 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB="cc00e003680200002c02000008000000c50300000a000000000000000000000071ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007732000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000048f4dc80b1044762a9c9cf09bcbcb3e70e328d7902ed3be78472570af3b26a28bb251aa541c35fa785fe3b6ba62a6ba600a47f7300ca7f838899b078f7410801c14255e0702d4d1b53ede35843b031a5f34b84ad8903c13c0811da34a7276b5805ff3d76b998a8603d0a6652ec3b1c0e1f14d42b85f98e520e3b3386a8a8254cb754649cec7b3aba1e3fa0f150db430dc06fe9df"], 0x43e) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0, 0x39}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)="24017e64c9f118cb2b11301a65026e17ce116c05fa2d49694afbb73ba4bdbf90e9fea962a9a94acf28274b873c685208b1810d1a6cc4b1d1e94a758e0e53fa5ee494fc669997c72410d5979a4b7e9757a8af3ca3c141", 0x56}, {&(0x7f00000000c0)="d70b084d423d81204206537fe1", 0xd}, {&(0x7f0000000280)="b2f9bc61996d65e9972b6df513fcce31f376f2c4bce15d2a02ae585b1d1c26a2e4cfe614ef10d90e7137b4f24623f68f620800c01c1309e9f57cb15cc1", 0x3d}, {&(0x7f00000002c0)="f3abdf10004709f9d5a00bfdbd55da1e133256ad538684f2ee4f0a7f0f96578565ce840fdc353d37fdaca466f3f4429f357fec5be31400f8e70c4bc297547cefdba9eab4e6f2f5a9ab8ae96ac133ddc37a1086bc7bae0a6335ab13a2d8759159d5c31ed686996e0922b967a600defdef4e2bf20ec71132aacb29e0ab24c9ba0e17516c8ada4624ba6b39e4f37071d1329d696b821b4bdb074c59b48ef4ac21b8e5cd1e91eb32957e3ae8e9ba73670f0aa6a34ce25596439a8689d9216dfbe19f231a9b", 0xc3}], 0x4, &(0x7f0000000d80)=[{0x1010, 0x1, 0x1, "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"}, {0x28, 0x103, 0x1, "08c9f4502ca9042566c250c80688f9b4ed7d71"}, {0x18, 0x6e, 0x8, "3dd801bda2749986"}, {0x1010, 0x11, 0x7fffffff, "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"}], 0x2060}, 0x20000000) dup2(r1, r2) 07:18:14 executing program 1: write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext={0x10eb, 0x6}, 0x4090}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) syz_open_dev$sndmidi(0x0, 0x2, 0x200202) 07:18:14 executing program 5: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) 07:18:14 executing program 1: write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @remote, 0xfffffffc}, 0x1c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) r4 = fcntl$dupfd(r3, 0x0, r1) ioctl$sock_SIOCSIFBR(r4, 0x8941, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000180)=""/187, 0x8}) dup2(r2, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x24000021, &(0x7f0000000a80)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) ioctl$FS_IOC_MEASURE_VERITY(r5, 0xc0046686, &(0x7f0000000280)={0x1, 0x14, "a5ba1723a961ffda8b4824483f5330fe1ee7e949"}) syz_open_dev$sndmidi(0x0, 0x2, 0x200202) 07:18:14 executing program 5: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) [ 703.369644][T20596] loop4: detected capacity change from 0 to 264192 [ 703.393345][T20596] hfsplus: unable to parse mount options 07:18:17 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:18:17 executing program 3: ioctl$BTRFS_IOC_GET_FEATURES(0xffffffffffffffff, 0x80189439, &(0x7f00000000c0)) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYBLOB="cc00e003680200002c02000008000000c50300000a000000000000000000000071ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000067d92f3ab8a59f072c8ec579569bbcec02a7c5841f90b6b1b8650218b2a5c03c7f8c8b51b9de92ae6027fd99d6ac1c9795abfbc99a8fad4889fa403a1b20d9c4bd57a9132b1030d4ad43870c19256948899b3c61cecd949a0e46f722fd89670d389cb0"], 0x43e) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x6404, 0x0, 0x0, 0x0, 0x80000000001}, 0x0, 0x3, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x22000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000180)=@usbdevfs_disconnect={0x5}) dup2(r1, r2) 07:18:17 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) r1 = geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) fchown(0xffffffffffffffff, 0xee01, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f00000001c0)="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", 0x2000, &(0x7f0000002fc0)={&(0x7f00000021c0)={0x50, 0x0, 0x200, {0x7, 0x21, 0x81, 0x40800, 0x9, 0x7, 0xdb, 0xcd28}}, &(0x7f0000002240)={0x18, 0xfffffffffffffff5, 0x66}, &(0x7f0000002280)={0x18, 0x0, 0xf0f7, {0xffffffffffffcafc}}, &(0x7f00000022c0)={0x18, 0x0, 0x4}, &(0x7f0000002300)={0x18, 0xfffffffffffffff5, 0x0, {0x5}}, &(0x7f0000002380)={0x28, 0xfffffffffffffff5, 0x7, {{0x1, 0x800, 0x1}}}, &(0x7f00000023c0)={0x60, 0x0, 0x0, {{0x9, 0xffff, 0x0, 0x80, 0x5, 0x5, 0x8}}}, &(0x7f0000002440)={0x18, 0x0, 0x80000000, {0x5}}, &(0x7f0000002480)={0x20, 0x0, 0x101, {'/dev/sequencer2\x00'}}, &(0x7f00000024c0)={0x20, 0x0, 0x910d, {0x0, 0x8}}, &(0x7f0000002500)={0x78, 0x0, 0x8, {0x6, 0x44, 0x0, {0x0, 0x20, 0xcdf, 0x7f, 0x5, 0x100000001, 0x2, 0x5, 0x1, 0xa000, 0x0, r1, 0xee01, 0x83, 0x1056cb6a}}}, &(0x7f0000002580)={0x90, 0x0, 0x8, {0x1000, 0x3, 0x3, 0x1, 0x906a, 0x1, {0x4, 0xd2, 0x3, 0x3, 0x4, 0x401, 0x6, 0xe6, 0x5, 0x6000, 0x1, r1, 0x0, 0x5a0, 0x401}}}, &(0x7f0000002640)={0x108, 0x0, 0x20, [{0x6, 0x8, 0x10, 0x2, '/dev/sequencer2\x00'}, {0x3, 0x10001, 0x4, 0x9, '{]&['}, {0x4, 0x0, 0xa, 0x7, '#{#\xb1::[&*\\'}, {0x4, 0x7, 0xc, 0x4, '/dev/ashmem\x00'}, {0x0, 0x8, 0x2, 0x200, '.!'}, {0x4, 0x8, 0x0, 0x1f}, {0x2, 0x8000, 0xc, 0x1, '/dev/ashmem\x00'}]}, &(0x7f00000028c0)={0x5d8, 0x0, 0x100, [{{0x1, 0x2, 0x5, 0x4, 0x1a, 0x7ff, {0x2, 0x4, 0x4, 0x9, 0xffffffff, 0x80000000, 0x3, 0x5, 0x3a45, 0x2000, 0x6, r1, 0xffffffffffffffff, 0x1, 0x9}}, {0x1, 0x0, 0xc, 0x1cd08433, '/dev/ashmem\x00'}}, {{0x6, 0x2, 0x4, 0x80000001, 0x2, 0x80000001, {0x1, 0x5, 0xfffffffffffffffe, 0x80, 0x9, 0xbb, 0x2, 0x7, 0x0, 0xa000, 0xfffffffc, r1, 0xffffffffffffffff, 0x8, 0x10001}}, {0x5, 0x9, 0xc, 0xffff, '/dev/ashmem\x00'}}, {{0x1, 0x0, 0x3f000, 0x2, 0x80000001, 0x9, {0x4, 0x1, 0x8, 0x4, 0x2, 0x3, 0x7, 0x9, 0x0, 0x8000, 0x7, 0x0, 0x0, 0x6, 0x100}}, {0x2, 0xb50, 0x1, 0x6, ']'}}, {{0x3, 0x3, 0x4, 0x9, 0x5, 0x7, {0x2, 0x6, 0x73, 0x3, 0xfffffffffffffff7, 0x3, 0x7f8f, 0x9, 0x8, 0x2000, 0x80000000, r1, 0x0, 0x2, 0x8}}, {0x6, 0x2, 0xc, 0x800, '/dev/ashmem\x00'}}, {{0x1, 0x1, 0x8001, 0x9, 0xd3f3, 0x101, {0x2, 0x2, 0x5, 0x7, 0x80000, 0x1, 0xffffff34, 0x2, 0x8b87, 0xc000, 0x4, 0x0, 0xffffffffffffffff, 0x80000001, 0x6}}, {0x4, 0x81, 0x10, 0x2, '/dev/sequencer2\x00'}}, {{0x0, 0x3, 0x7fff, 0x3, 0xffffff7d, 0x2, {0x4, 0x4, 0x5, 0x1, 0x3, 0x1000000, 0x5, 0x5, 0x1a, 0x4000, 0x9, 0x0, 0xee01, 0xee, 0x941e}}, {0x1, 0x0, 0x10, 0x7ff, '/dev/sequencer2\x00'}}, {{0x5, 0x2, 0x9, 0x2, 0x6, 0x0, {0x3, 0x9, 0x1, 0x103, 0x33, 0x0, 0x6, 0xffff, 0x6, 0x6000, 0xffffffff, r1, r2, 0x1f, 0x7}}, {0x1, 0xb1, 0xc, 0x2, '/dev/ashmem\x00'}}, {{0xfff, 0x3, 0x3, 0x6, 0x0, 0x8, {0x2, 0xcf09, 0xfffffffffffffff9, 0x2, 0xf2, 0xedef, 0x3ff, 0x401, 0x3, 0x4000, 0xffffffff, r1, 0xffffffffffffffff, 0x6, 0x101}}, {0x1, 0xa000000000, 0x1, 0x5, ','}}, {{0x4, 0x3, 0x6, 0x200, 0x5, 0x8, {0x5, 0x8, 0x1, 0x1, 0xc32, 0x7f, 0x9, 0x6, 0x80ad, 0xa000, 0x5, r4, 0xee00, 0x7, 0x8}}, {0x0, 0x4, 0x0, 0x10000}}]}, &(0x7f0000002ec0)={0xa0, 0x0, 0x8, {{0x4, 0x2, 0x1000, 0x9, 0x6, 0x400, {0x6, 0x1, 0xfffffffffffffff9, 0x3f, 0xa216, 0x2, 0x7, 0x4, 0x8, 0xa000, 0x3, r1, 0x0, 0x9}}, {0x0, 0x8}}}, &(0x7f0000002f80)={0x20, 0xfffffffffffffff5, 0x2, {0x8000, 0x4, 0x81, 0x5}}}) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r5, r6) setsockopt$sock_int(r0, 0x1, 0x13, &(0x7f00000000c0)=0x1, 0x4) 07:18:17 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000006c0)=""/4096) fcntl$addseals(r0, 0x409, 0x5) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) 07:18:17 executing program 5: write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @remote, 0xfffffffc}, 0x1c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) r4 = fcntl$dupfd(r3, 0x0, r1) ioctl$sock_SIOCSIFBR(r4, 0x8941, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000180)=""/187, 0x8}) dup2(r2, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x24000021, &(0x7f0000000a80)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) ioctl$FS_IOC_MEASURE_VERITY(r5, 0xc0046686, &(0x7f0000000280)={0x1, 0x14, "a5ba1723a961ffda8b4824483f5330fe1ee7e949"}) syz_open_dev$sndmidi(0x0, 0x2, 0x200202) 07:18:17 executing program 1: write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @remote, 0xfffffffc}, 0x1c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) r4 = fcntl$dupfd(r3, 0x0, r1) ioctl$sock_SIOCSIFBR(r4, 0x8941, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000180)=""/187, 0x8}) dup2(r2, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x24000021, &(0x7f0000000a80)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) ioctl$FS_IOC_MEASURE_VERITY(r5, 0xc0046686, &(0x7f0000000280)={0x1, 0x14, "a5ba1723a961ffda8b4824483f5330fe1ee7e949"}) syz_open_dev$sndmidi(0x0, 0x2, 0x200202) 07:18:17 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f00000024c0)=ANY=[@ANYBLOB="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"], 0x43e) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) read$FUSE(0xffffffffffffffff, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) fchown(0xffffffffffffffff, 0xee01, r3) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, r3) 07:18:17 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x4e23, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x794fd253}}, 0x0, 0x0, 0x23, 0x0, "4e9bb13b2596e77773627290c2f3f9d1c727f2f135daf5c7c6ebc5a726e235181fb71432f94a54e4fdb01c6a1058a1a60cef4e7eff97a6a7a7ff9d19808428a1223e4721489d39e8111db633979213d1"}, 0xd8) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0x100, 0xb, 0x6, 0x201, 0x0, 0x0, {0xc, 0x0, 0x3}, [@IPSET_ATTR_ADT={0x84, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz0\x00'}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0x6}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x5}}, {0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @mcast2}}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x8}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @random="6ef47243df6d"}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e20}}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0x54, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @private1={0xfc, 0x1, [], 0x1}}}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x62}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x7ed}, @IPSET_ATTR_IFACE={0x14, 0x17, 'macvlan0\x00'}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x33}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x60008011}, 0x8880) sendto$inet6(r1, 0x0, 0x0, 0x24000021, &(0x7f0000000a80)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r2, r3) 07:18:17 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/830], 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x5}, 0xc0a, 0x100, 0x0, 0x1, 0x3}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) syz_open_dev$usbfs(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x147042) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r2, 0x40087703, 0xdb48) 07:18:17 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0xe0, 0x3, 0x268, 0x22c, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], [], []]}, 0x43e) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) r1 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000180)='net_prio.ifpriomap\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x40, r1, &(0x7f00000001c0)="8c245e7afdd044f7ae4e74d81ee23147b12541a97b2603fa39c8c5a9f0dfc9d5772f6562d6b88c272aed55f2bbb65d925a5fb2cecb708a75dc01d3478d4e459ec5ce4aa9f391c7d41a5639612d9f3c59bfc6b5fbf997893569ac04107f99cfb426ec6bfa382091a48d89c13e88d287db3a", 0x71, 0xffffffff00000000, 0x0, 0x1}, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000002c0)=0x3ff) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x581100, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r3, r4) 07:18:17 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x200c0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@rand_addr=0x64010101, 0x4e23, 0x101, 0x4e23, 0x0, 0x8, 0x0, 0x20, 0x87, 0x0, 0xee00}, {0x6, 0x7, 0x2, 0x6, 0x101, 0x3a, 0x7, 0xff}, {0x5, 0x4, 0x7fff, 0xe7}, 0xffffffc1, 0x6e6bb7, 0x2, 0x1, 0x2, 0x3}, {{@in6=@private2={0xfc, 0x2, [], 0x1}, 0x4d5, 0x33}, 0x8, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3500, 0x4, 0x0, 0xb0, 0x81, 0xf910, 0x8001}}, 0xe8) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) r3 = syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000280)='./file0\x00', 0xffffffffffffff8d, 0x4, &(0x7f0000000900)=[{&(0x7f00000002c0)="493bd1a77fa81e65bc85476f6bf2c6cb927d0604de7225f8437ed11d064abcfa2d670cf4f2c3ba9fc2995eadc5bd30cbb11903f9efb14593b4e71ea50ecbb3acca4859d883b29e74cbc178d1b1ef2fdfc248837f04931485a435822b20eba0be7de6812008e3699622f64354549710cdec6aa738055ebf55", 0x78, 0xd80c}, {&(0x7f00000006c0)="3890c5782331ef0e9461c4525d8b0eabc4cefbeedbc2a81e4e167ed3638ac6a398b38469e5ff97d5050a6d1490d2666a55f56bc766928d3d8eee78e3ffa192f9344fdb49a14e4a176976a28e3be7836daee38759184de31756f7", 0x5a, 0xfff}, {&(0x7f0000000740)="f3f1a7574ee6dc4d17a9b8be3d1491b12ce60ce9a617e13707ff0143c8ef484b6f89079500706faecd0dbdae48738e74e621bc75e72bb0d6a107ca4c03fdcd8fe2cb0ad9b796afcb376cbe30e4831659b820320138dd7af6ae9851cf3bff745d82fae89a448b920c5a28abf5f4941befc84e5cde0c3684f3341fe66e0b427cfc4bdbef68db34627207334a8084f3c9cc73a213a5e689240a836d97f81443bafdf6b1b3bf8f2fc17b9cc57b7308288ddf95d5254d55f894e791ac743ff6827d2c84eee09cd81f32564012ffee6a9919e4c4daa61c282094496a237fa8d8879c238e4705ec501d6b0dfa91d4bf4164bfca1d6527", 0xf3, 0x2}, {&(0x7f0000000840)="916aadf6f507cdc96af6899662a56a83167c3c93b36cf1be1778fdcd9073fcce448664e3bc79602b9038d3f817fb82ddaf04aba1985cb00e5802d03e68888a99ecc36dac2c0a7cd8c6520096afef0947cb4c3741f4c37e6011d7b638edd72bb537a07ba3e22cbf72c11669511c80b85495258c2ee5bbe5298991ae98de0085a3637d9d733c3a5484d3a44d77284b", 0x8e}], 0x1000000, &(0x7f0000000980)={[{@discard='discard'}, {@fmask={'fmask', 0x3d, 0x81}}, {@errors_remount='errors=remount-ro'}, {@fmask={'fmask', 0x3d, 0xfffffffffffffff9}}, {@errors_remount='errors=remount-ro'}, {@errors_continue='errors=continue'}, {@errors_remount='errors=remount-ro'}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}]}) signalfd(r3, &(0x7f0000000340)={[0x737b]}, 0x8) 07:18:18 executing program 1: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0xe0, 0x5, 0x268, 0x22c, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00"}, 0x3e) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) [ 706.456398][T20684] loop4: detected capacity change from 0 to 264192 [ 706.821841][T20684] exfat: Bad value for 'fmask' 07:18:20 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:18:20 executing program 5: write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @remote, 0xfffffffc}, 0x1c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) r4 = fcntl$dupfd(r3, 0x0, r1) ioctl$sock_SIOCSIFBR(r4, 0x8941, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000180)=""/187, 0x8}) dup2(r2, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x24000021, &(0x7f0000000a80)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) ioctl$FS_IOC_MEASURE_VERITY(r5, 0xc0046686, &(0x7f0000000280)={0x1, 0x14, "a5ba1723a961ffda8b4824483f5330fe1ee7e949"}) syz_open_dev$sndmidi(0x0, 0x2, 0x200202) 07:18:20 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="2321202e2f66696c653020f0"], 0x191) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000002c0)=@v3={0x3000000, [{}, {0x6e3}]}, 0x18, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x200000) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) close(0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)=ANY=[@ANYRES16=0x0, @ANYBLOB="040000009627561cb1d0cf9cc4aaf4e03537a781c215cdc4df010b296fc4def7668695d270c6fcd258696c1cf75b3215ff7f0000e300"/67], 0xa8}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x20000040) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0xe0, 0x3, 0x268, 0x22c, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], [], []]}, 0x43e) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) 07:18:20 executing program 1: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0xe0, 0x5, 0x268, 0x22c, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00"}, 0x3e) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) 07:18:20 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x24000021, &(0x7f0000000a80)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x2}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000000c0)=0x0) fchown(r3, r4, 0xffffffffffffffff) dup2(r1, r2) 07:18:20 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000007c0)=ANY=[@ANYBLOB="7800000024000b0f000000000000000000000000cb3f8fcbf4528233b46f541f8a85501d4b452db4244dbc7a5ca1f00999e3c872822047e51c1945189aa65d95856576363f2fb2b77113966ec93333d3f548454be6835da4303659aee4a9abf57daad134f5b9ec373a89b1e106b5b68f9a73d05ff90587fcd79f35b61c9fa4bef48545c61b24003de59e7ba6317edfbc78b5ec4936d185bdb171fdd734fbbbe1af475982c934dfa0409c995ef8546885c68820aa27df5d104ae8055864572c72fb6b775f3ce1955a7002c843884706caea563dce6400ede5bd6b7704b8b3649028bea93ce66f8a2e69f1c582d439ac508b6fb6abf114e5f01a5ea671e32f967813aa83649e765be1a62dc5994df2b25bbf6066f256004666a7ec5ef3905b30dafb30d61e0b07d994e5f46668c181c13ce8310a2e", @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100736671004c0002000000000000000000000000000000000000000400"/96], 0x78}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@ipv6_getnexthop={0x54, 0x6a, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NHA_OIF={0x8}, @NHA_GROUPS={0x4}, @NHA_FDB={0x4}, @NHA_ID={0x8}, @NHA_ID={0x8}, @NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8, 0x5, r4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x22004800}, 0x8000) [ 708.972852][T20716] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.4'. 07:18:20 executing program 1: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0xe0, 0x5, 0x268, 0x22c, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00"}, 0x3e) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) [ 709.080790][T20714] ptrace attach of "/root/syz-executor.3"[20710] was attempted by "/root/syz-executor.3"[20714] 07:18:20 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x43e) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x0, 0x5, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) 07:18:20 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0xa, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r2, 0x29, 0x3e, 0x0, 0xa04901) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) [ 709.132374][T20712] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.4'. 07:18:20 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) 07:18:20 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x24000021, &(0x7f0000000a80)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x2}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000000c0)=0x0) fchown(r3, r4, 0xffffffffffffffff) dup2(r1, r2) 07:18:20 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() r0 = gettid() tkill(r0, 0x16) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x6, 0x0, 0xfffffffffffffffe, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, r1, 0x57a470b327747d01) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r2, r3) 07:18:23 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:18:23 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0xe0, 0x3, 0x268, 0x22c, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], [], []]}, 0x43e) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x290981, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) 07:18:23 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x1, 0x70, 0x7, 0x5, 0x7, 0xda, 0x0, 0x1, 0x24000, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1f, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x1c06, 0x80000001, 0x5504445a, 0x2, 0x3, 0x7, 0x6b17}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) 07:18:23 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0xa, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r2, 0x29, 0x3e, 0x0, 0xa04901) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) 07:18:23 executing program 5: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x200c0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@rand_addr=0x64010101, 0x4e23, 0x101, 0x4e23, 0x0, 0x8, 0x0, 0x20, 0x87, 0x0, 0xee00}, {0x6, 0x7, 0x2, 0x6, 0x101, 0x3a, 0x7, 0xff}, {0x5, 0x4, 0x7fff, 0xe7}, 0xffffffc1, 0x6e6bb7, 0x2, 0x1, 0x2, 0x3}, {{@in6=@private2={0xfc, 0x2, [], 0x1}, 0x4d5, 0x33}, 0x8, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3500, 0x4, 0x0, 0xb0, 0x81, 0xf910, 0x8001}}, 0xe8) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) r3 = syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000280)='./file0\x00', 0xffffffffffffff8d, 0x4, &(0x7f0000000900)=[{&(0x7f00000002c0)="493bd1a77fa81e65bc85476f6bf2c6cb927d0604de7225f8437ed11d064abcfa2d670cf4f2c3ba9fc2995eadc5bd30cbb11903f9efb14593b4e71ea50ecbb3acca4859d883b29e74cbc178d1b1ef2fdfc248837f04931485a435822b20eba0be7de6812008e3699622f64354549710cdec6aa738055ebf55", 0x78, 0xd80c}, {&(0x7f00000006c0)="3890c5782331ef0e9461c4525d8b0eabc4cefbeedbc2a81e4e167ed3638ac6a398b38469e5ff97d5050a6d1490d2666a55f56bc766928d3d8eee78e3ffa192f9344fdb49a14e4a176976a28e3be7836daee38759184de31756f7", 0x5a, 0xfff}, {&(0x7f0000000740)="f3f1a7574ee6dc4d17a9b8be3d1491b12ce60ce9a617e13707ff0143c8ef484b6f89079500706faecd0dbdae48738e74e621bc75e72bb0d6a107ca4c03fdcd8fe2cb0ad9b796afcb376cbe30e4831659b820320138dd7af6ae9851cf3bff745d82fae89a448b920c5a28abf5f4941befc84e5cde0c3684f3341fe66e0b427cfc4bdbef68db34627207334a8084f3c9cc73a213a5e689240a836d97f81443bafdf6b1b3bf8f2fc17b9cc57b7308288ddf95d5254d55f894e791ac743ff6827d2c84eee09cd81f32564012ffee6a9919e4c4daa61c282094496a237fa8d8879c238e4705ec501d6b0dfa91d4bf4164bfca1d6527", 0xf3, 0x2}, {&(0x7f0000000840)="916aadf6f507cdc96af6899662a56a83167c3c93b36cf1be1778fdcd9073fcce448664e3bc79602b9038d3f817fb82ddaf04aba1985cb00e5802d03e68888a99ecc36dac2c0a7cd8c6520096afef0947cb4c3741f4c37e6011d7b638edd72bb537a07ba3e22cbf72c11669511c80b85495258c2ee5bbe5298991ae98de0085a3637d9d733c3a5484d3a44d77284b", 0x8e}], 0x1000000, &(0x7f0000000980)={[{@discard='discard'}, {@fmask={'fmask', 0x3d, 0x81}}, {@errors_remount='errors=remount-ro'}, {@fmask={'fmask', 0x3d, 0xfffffffffffffff9}}, {@errors_remount='errors=remount-ro'}, {@errors_continue='errors=continue'}, {@errors_remount='errors=remount-ro'}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}]}) signalfd(r3, &(0x7f0000000340)={[0x737b]}, 0x8) 07:18:23 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0xa, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r2, 0x29, 0x3e, 0x0, 0xa04901) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) 07:18:23 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/830], 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r1, 0xc4009420, &(0x7f00000006c0)={0x0, 0x0, {0x4, @struct={0xfffffff7, 0x7}, 0x0, 0x3, 0x4, 0x2, 0x1, 0x6, 0x8, @usage=0x2, 0x2, 0x2, [0x25f6, 0x47a0, 0x7, 0x8, 0x5, 0x6]}, {0x0, @usage=0xfffffffffffffff8, 0x0, 0x50000, 0xba, 0x9, 0x10000, 0x4, 0x44, @usage=0x3, 0x7f, 0x4, [0x80000000, 0x5, 0x5a09f8eb, 0x819a, 0xfffffffffffffff8, 0x9]}, {0x20, @struct={0xffffffc0, 0x9}, 0x0, 0x94c, 0x8, 0xffffffffffffff7f, 0x4, 0xfff, 0x404, @struct={0x401, 0x6}, 0x7fff, 0x7, [0xf94, 0x7fff, 0x40, 0x5, 0x8, 0x1]}, {0x80, 0xa388, 0xff}}) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000ac0)={r3, "88f4cdf86b3e8140bde891460a6ddbfd"}) dup2(r1, r2) [ 712.172680][T20766] loop5: detected capacity change from 0 to 264192 07:18:23 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="cc00e003680200002c02000008000000c50300000a000000000000000000000071ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/1086], 0x43e) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x3000002, 0x4010, 0xffffffffffffffff, 0xd4118000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r4) [ 712.226373][T20766] exfat: Bad value for 'fmask' 07:18:23 executing program 5: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0xe0, 0x3, 0x268, 0x22c, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], [], []]}, 0x43e) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) r1 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000180)='net_prio.ifpriomap\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x40, r1, &(0x7f00000001c0)="8c245e7afdd044f7ae4e74d81ee23147b12541a97b2603fa39c8c5a9f0dfc9d5772f6562d6b88c272aed55f2bbb65d925a5fb2cecb708a75dc01d3478d4e459ec5ce4aa9f391c7d41a5639612d9f3c59bfc6b5fbf997893569ac04107f99cfb426ec6bfa382091a48d89c13e88d287db3a", 0x71, 0xffffffff00000000, 0x0, 0x1}, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000002c0)=0x3ff) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x581100, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r3, r4) 07:18:23 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYBLOB="cc00e003680200002c02000008000000c50300000a000000000000000000000071ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000036800454a2b2b32e7ac88b570d4c67204a72d7d98c0057ee0c1904b1cfb75990201cfd18426d414ac2fe50f829e0270ad843b6edece73dcd28"], 0x43e) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) 07:18:23 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0xa, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r2, 0x29, 0x3e, 0x0, 0xa04901) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) 07:18:24 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$afs(&(0x7f00000000c0)='afs\x00', &(0x7f0000000180)='./file0\x00', 0x41c6, 0x3, &(0x7f0000001340)=[{&(0x7f00000001c0)="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", 0x1000, 0x8}, {&(0x7f00000011c0)="82160e6794ac8b2a9380b290a10fc7e2d60712039f78931c5adfd9f25622334dd3d38ce4404ba79ef7c8fc71fa59c5e46f51929814e649a75abc6d102a4b5e04b1d013b9ff32658c034553d4a9ecedcf6d7b", 0x52, 0xffff}, {&(0x7f0000001240)="bbdd806bc8e18cccbfd9550c86ae7853dc245ae70a253fca9895c66b4c5f8eb85b01e8949dba6f911a9df35153a3e77d6747a6b4db75636c24a4e23037b9f54503aff30044aefdbc3f16fee78d2e55d92e8f86025249549f7f30e4f2094bce7f44ee6381a102712b072e9d595bd19f45c0e67d7f62d1dd586ea4fbb7e147089c5801410743ef8ccf5cbba8e30bac0d1a932bb424a899ce8fb3569a7c896dc744cc591b81275945d5d1914fc3856bf02da46452de4aeac6ca3ae2861197c20d121f142850574f363c42800fc6792f30f5e979c36ff8995a7fd09aec296deedf779faa49d86cb3bf647c1a", 0xea, 0x9}], 0x90, &(0x7f00000013c0)={[{@flock_strict='flock=strict'}, {@flock_strict='flock=strict'}, {@flock_openafs='flock=openafs'}, {@flock_write='flock=write'}, {@source={'source', 0x3d, '+!'}}], [{@subj_role={'subj_role', 0x3d, '/dev/sequencer2\x00'}}, {@context={'context', 0x3d, 'system_u'}}, {@appraise_type='appraise_type=imasig'}, {@subj_role={'subj_role', 0x3d, '/dev/ashmem\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffff8}}]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xa) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000001480)='/dev/vcs#\x00', 0x1f, 0x4000) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r3) [ 712.825329][T20795] loop0: detected capacity change from 0 to 255 [ 712.860319][T20795] kAFS: unparsable volume name 07:18:26 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:18:26 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x30240, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) 07:18:26 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0xa, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r2, 0x29, 0x3e, 0x0, 0xa04901) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:18:26 executing program 5: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) r3 = openat$mice(0xffffffffffffff9c, &(0x7f0000000200)='/dev/input/mice\x00', 0x400100) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x81, 0x9, 0x8, 0x0, 0x0, 0x6, 0x40840, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x400, 0x0, @perf_bp={&(0x7f00000000c0), 0x6}, 0x1c01c, 0x4, 0x3, 0x5, 0x78b, 0x7fffffff, 0x5}, 0x0, 0xd, r3, 0x8) perf_event_open$cgroup(&(0x7f0000000240)={0x5, 0x70, 0x81, 0x41, 0x9, 0x3, 0x0, 0xfffffffffffffffe, 0x80044, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, @perf_config_ext={0xffffffff, 0x80000001}, 0x10, 0x0, 0x4, 0x1, 0x1, 0x6, 0x401}, 0xffffffffffffffff, 0x9, r0, 0x4) 07:18:26 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0xe0, 0x3, 0x268, 0x22c, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], [], []]}, 0x43e) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000500)='/dev/loop-control\x00', 0xc000, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r4) dup2(r2, r3) 07:18:26 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000180)) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) 07:18:26 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0xa, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r2, 0x29, 0x3e, 0x0, 0xa04901) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) 07:18:26 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="cc000000680200000000000008000000c50300000a000000000000000000000071ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/818], 0x33e) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0xe, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) close(0xffffffffffffffff) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000180)=0x14) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) 07:18:27 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x288, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xc) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) 07:18:27 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0xe0, 0x3, 0x268, 0x22c, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], [], []]}, 0x43e) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, 0x0, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f00000000c0)={0x1b, 0x3, 0xff}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r2, r3) 07:18:27 executing program 5: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) r3 = openat$mice(0xffffffffffffff9c, &(0x7f0000000200)='/dev/input/mice\x00', 0x400100) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x81, 0x9, 0x8, 0x0, 0x0, 0x6, 0x40840, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x400, 0x0, @perf_bp={&(0x7f00000000c0), 0x6}, 0x1c01c, 0x4, 0x3, 0x5, 0x78b, 0x7fffffff, 0x5}, 0x0, 0xd, r3, 0x8) perf_event_open$cgroup(&(0x7f0000000240)={0x5, 0x70, 0x81, 0x41, 0x9, 0x3, 0x0, 0xfffffffffffffffe, 0x80044, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, @perf_config_ext={0xffffffff, 0x80000001}, 0x10, 0x0, 0x4, 0x1, 0x1, 0x6, 0x401}, 0xffffffffffffffff, 0x9, r0, 0x4) 07:18:27 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0xa, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r2, 0x29, 0x3e, 0x0, 0xa04901) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 07:18:29 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:18:29 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) r0 = geteuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x40020, 0x56bfd963a9be347c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x6}, 0x0, 0x0, 0x1, 0x7, 0x8}, 0x0, 0xe, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) ioctl$SIOCAX25GETUID(0xffffffffffffffff, 0x89e0, &(0x7f00000000c0)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r0}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) socket$inet(0x2, 0x1, 0x6) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x100, 0x0, 0x800008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000200)=0x28, 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) ioctl$FIGETBSZ(r3, 0x2, &(0x7f0000000180)) dup2(r1, r2) 07:18:29 executing program 5: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) r3 = openat$mice(0xffffffffffffff9c, &(0x7f0000000200)='/dev/input/mice\x00', 0x400100) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x81, 0x9, 0x8, 0x0, 0x0, 0x6, 0x40840, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x400, 0x0, @perf_bp={&(0x7f00000000c0), 0x6}, 0x1c01c, 0x4, 0x3, 0x5, 0x78b, 0x7fffffff, 0x5}, 0x0, 0xd, r3, 0x8) perf_event_open$cgroup(&(0x7f0000000240)={0x5, 0x70, 0x81, 0x41, 0x9, 0x3, 0x0, 0xfffffffffffffffe, 0x80044, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, @perf_config_ext={0xffffffff, 0x80000001}, 0x10, 0x0, 0x4, 0x1, 0x1, 0x6, 0x401}, 0xffffffffffffffff, 0x9, r0, 0x4) 07:18:29 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0xcd, 0x3, 0x7, 0xff, "2c9c636be194f5c028ea42f879e305021416736b25a49deafce2a84d8366a38302697676694ee7754a82b9a6feb8bf854905e83703ed561b17403e8be0acfadb46f47c4f3801b423f34e70b840ccfb2bde53d542289527ad41c1a72d0927d6fd56a9f97f86b56862dfbba7600b92cbbbf31e034d87f5cebd23ef431ab30b3bd1f832b0646972930a578f64be0a73f3ca2d1d39185d1527575e304ced7e02202610135c5ef0a27249398739951b375c7594e0dbcb2f"}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='*\x00') openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) 07:18:29 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0xa, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r2, 0x29, 0x3e, 0x0, 0xa04901) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 07:18:29 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="cc00e003680200002c02000008000000c50300000a000000000000000000000071ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002e"], 0x43e) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) 07:18:29 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0xa, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r2, 0x29, 0x3e, 0x0, 0xa04901) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 07:18:30 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0xa, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r2, 0x29, 0x3e, 0x0, 0xa04901) 07:18:30 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000180)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x400100, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r4) dup2(0xffffffffffffffff, r2) 07:18:30 executing program 5: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000200)='/dev/input/mice\x00', 0x400100) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x81, 0x9, 0x8, 0x0, 0x0, 0x6, 0x40840, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x400, 0x0, @perf_bp={&(0x7f00000000c0), 0x6}, 0x1c01c, 0x4, 0x3, 0x5, 0x78b, 0x7fffffff, 0x5}, 0x0, 0xd, r2, 0x8) 07:18:30 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @private0={0xfc, 0x0, [], 0x1}, 0xfffffffb}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) 07:18:30 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/1086], 0x43e) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000002c0)={0x0, {}, 0x0, {}, 0x100, 0x2, 0x3, 0x4, "6874334ea1aaf4cc90b009fc6de12829a5ac02401c2bc65f5397e7f4beef914122beb1f08c0b2641c61e01f91058918456f21e29dbb86c6dc6d923e105c7a158", "4b613bc9017161be074fb1c75667aa11efe45230c90dff2f3096ea88046596b5", [0x3]}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) r3 = syz_open_dev$char_usb(0xc, 0xb4, 0x2) sendfile(r1, r3, &(0x7f0000000240)=0x2, 0x2) getpeername$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r2, r4) pipe(&(0x7f00000000c0)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x100, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000280)={'vlan0\x00', 0x2}) 07:18:32 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:18:32 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0xa, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) getsockopt$bt_BT_SECURITY(r2, 0x29, 0x3e, 0x0, 0xa04901) 07:18:32 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000006c0), 0xe}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresuid(&(0x7f00000004c0), &(0x7f0000000500)=0x0, &(0x7f0000000540)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000700)='/dev/vcsa\x00', 0x80, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000740)={@in6={{0xa, 0x4e22, 0x5, @dev={0xfe, 0x80, [], 0x3d}, 0x4c5}}, 0x0, 0x0, 0x46, 0x0, "98ed6d46f093f50392cabcf8376c4b4a64279192dd47a1bb10cd1c278d47877cc525252abdfb25998ec900f10866ca8ca2c4f741c4204ceb789e8b79086577da0fac61e8e364c804f98117b2fe21175b"}, 0xd8) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x6, 0x3, &(0x7f0000000440)=[{&(0x7f0000000300)="e56d3a8a6a64fcac35de", 0xa, 0x7}, {&(0x7f0000000340)="567fb51ee16548d667ca219b62149a472fcb04b71669b232acadf9f0d60f0d2b0628e74304d983fd2bef094df5f60bf3f5abfbef7de39af0c1147acf4c81a817ca78e51cb605f235e3ebbd20b5299e5ac9bca58440670e67f5689e98971114880cac9c65191a9d057bd3bc1c79468d5ce57235d3855cc2f6090604abfe1fc8c3f373244b17b9284e926e87544c5d", 0x8e, 0x10}, {&(0x7f0000000400)="c7fde875ed3fd7b32df86fd396b80ec709db26834f1112a341e3cdc54bd6", 0x1e, 0x6}], 0x102000, &(0x7f0000000580)={[{@tails_off='tails=off'}, {@grpjquota='grpjquota'}, {@barrier_none='barrier=none'}, {@balloc_noborder='block-allocator=noborder'}, {@barrier_flush='barrier=flush'}, {@resize={'resize', 0x3d, 0x6}}, {@nolargeio='nolargeio'}, {@noacl='noacl'}], [{@euid_lt={'euid<', r1}}, {@smackfsroot={'smackfsroot', 0x3d, '%,'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@subj_type={'subj_type', 0x3d, '/dev/ashmem\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@dont_measure='dont_measure'}, {@obj_type={'obj_type'}}, {@subj_user={'subj_user', 0x3d, '/dev/sequencer2\x00'}}]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0xfb68) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) sendto$inet6(r0, &(0x7f0000000180)="b85ab989b3c12808c06c876f69f51d09d8e4713f218b3c6c8cab9542bc4c3df1be33cb7e14102c8b1ad9706ccbec99da2405b828b7bbbe9ebf0b7bc9c81df81d09524d96385cc7b5a2774d8ee7699bf2732d409e5798ad1fb322fcd1b9093d90e9c2d5b6d6fb24091468b5c73caf3d7e24716c965a2c5a50580283c69d73f2b30da8a995d0c62e31d5b0c6b248d56d84d66820c6d507c0247b69cade086c9d09b8107a84f5eba199823ea4cba3475a0d920bbfc87cedb5876aaedf62fc10b82047f6c7316a0e2c408bea7dc9595b4fd99826", 0xd2, 0x8010, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x25}, 0x101}, 0x1c) dup2(r3, r4) 07:18:32 executing program 5: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) openat$mice(0xffffffffffffff9c, &(0x7f0000000200)='/dev/input/mice\x00', 0x400100) 07:18:32 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x5, 0x4, 0x8a, 0xff, 0x0, 0xffffffff, 0x4200, 0x1a, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000000c0), 0x6}, 0xa2, 0x5, 0x7, 0x1, 0x3, 0x8, 0x3}, 0xffffffffffffffff, 0x1, r0, 0x12) dup2(r1, r2) 07:18:32 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYBLOB="cc00e003680200002c02000008000000c50300000a000000000000000000000071ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001e2270d9690000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/1091], 0x43e) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x1) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000000c0)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_eeprom={0xb}}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x6) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r4) 07:18:32 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0xa, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) getsockopt$bt_BT_SECURITY(r2, 0x29, 0x3e, 0x0, 0xa04901) 07:18:33 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0xa, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) getsockopt$bt_BT_SECURITY(r2, 0x29, 0x3e, 0x0, 0xa04901) 07:18:33 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000240)="ab71568dab310b6847d6430358692a9c28cb1f107ae15b791be45b6d236d528d993fe0e04a1f5d1f01e4f1da53887a57b73c4b8824eb84a08c9a188e89a1dc586cacfacacebbcd455a7f8638c4ea6382ac193da3f1cb2e558e497a9068085a08a454893777df12e184a2025e5a2f1745d9051fcc9f23a7912e6d59873d358d199af4378d253a23d5d48eaecb8169b2e65ee67642076b4d029c15a7aaeb", 0x9d, 0x80}], 0x40400, &(0x7f0000000340)={[{@fat=@codepage={'codepage', 0x3d, '864'}}], [{@obj_user={'obj_user', 0x3d, ' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x6, 0x7, 0x1, 0x1, 0x0, 0x1b, 0x100, 0xe, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x80000001, 0x48d}, 0xa89, 0x8, 0xffff, 0x5, 0x9, 0xa4, 0x7ff}, 0xffffffffffffffff, 0x2, r1, 0x1) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r2 = accept(r0, &(0x7f00000003c0)=@caif=@util, &(0x7f0000000440)=0x80) connect$inet(r2, &(0x7f0000000480)={0x2, 0x4e22, @remote}, 0x10) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x95, 0x5}, 0x10000, 0x0, 0x0, 0x0, 0x6, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r3, r4) 07:18:33 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) 07:18:33 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0xe0, 0x3, 0x268, 0x22c, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], [], []]}, 0x43e) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x200, 0x200000) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000180)={0x7f, "0020a9"}, 0x6) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x24000021, &(0x7f0000000a80)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) sendfile(r1, r2, 0x0, 0x1) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e22, 0x5, @dev={0xfe, 0x80, [], 0x41}, 0xffffffdc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r3, r4) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0xa) 07:18:33 executing program 5: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) 07:18:35 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:18:35 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0xa, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getsockopt$bt_BT_SECURITY(r2, 0x29, 0x3e, 0x0, 0xa04901) 07:18:35 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000f80)=[{{&(0x7f0000000480)={0xa, 0x4e24, 0x0, @dev, 0x5}, 0x1c, &(0x7f0000000a80)=[{&(0x7f00000005c0)='o', 0x1}], 0x1}}, {{&(0x7f0000000b40)={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c, 0x0, 0x0, &(0x7f0000000c40)=[@rthdr={{0x38, 0x29, 0x39, {0x0, 0x4, 0x2, 0x0, 0x0, [@remote, @dev]}}}], 0x38}}], 0x2, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r4) r5 = getpid() sched_setattr(r5, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x0, 0x77, 0x6, 0x0, 0x7, 0x80a1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd3, 0x2, @perf_config_ext={0x7fff, 0x11}, 0x8080, 0x4, 0x10001, 0x1, 0x0, 0x8001, 0xfff}, r5, 0x7, r2, 0x2) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r3, r6) 07:18:35 executing program 5: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) 07:18:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) r1 = syz_io_uring_complete(0x0) r2 = syz_open_dev$mouse(&(0x7f0000000340)='/dev/input/mouse#\x00', 0x7fff, 0xa80) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40100000}, 0xc, &(0x7f0000000480)={&(0x7f00000005c0)=ANY=[@ANYBLOB="e8000000", @ANYRES16=0x0, @ANYRESOCT, @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="00f3ff00", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="0c0003009b0f00000000000008000100000000000c00030000000080000000000c00020000020000000000000c00030020000000000000003400078008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="c8080001", @ANYRES32=r1, @ANYBLOB="00000000c2f86f5af26ce986c72d00e689e4fbead782d489174c0dd5ec7f34142245004fd1b6508fd73b6afdaf73f6adfacd342255556ab03d8b0e2cc0a5a5f3905ad9f75e06cbed20dbda1d1b3efeedb1dbfe480a6a9c71e07257d2f030206fb29ffa03b467c41950c59f69adca7e36880490887a3f991fb780ed7d3528949c047ffa4d3aa09fe23621690cff5c11d9782d81f7a7c4f2c49f349fa196c1057902c6c30107c046a2b091f828c15a6eb2ccaa716f3852b11e98406ba00455f14583db8cce9ea76fe89967e1b96f2290aba1189ba49a79aa995c9e592eadb1c409b011ce7ce3dad4c12e245765af9172f7560e2bd4b9f64838a8bae880bdbd5d5fd9de82bd675090a177b64623f0406882a3aa2a30ef02640a705bcc05193e160bd94b4aa6df9cb3ce", @ANYRES32=r2, @ANYBLOB='\f\x00\b\x00\t\x00\x00\x00\x00\x00\x00\x00'], 0xe8}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000280)}, 0x3008, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) sendto$inet6(r3, &(0x7f00000000c0)="e01a32b47401cd21a5c68047922733c8615a598ab7c9c6256799f380", 0x1c, 0x15, &(0x7f0000000180)={0xa, 0x4e23, 0x8, @mcast2}, 0x1c) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x40, 0x5, 0x7f, 0x0, 0x0, 0x2, 0x8640, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xfff, 0x0, @perf_config_ext={0x9, 0x9}, 0x2, 0x0, 0x6, 0x6, 0x6, 0x1, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r4, r5) 07:18:35 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYBLOB="cc00e003680200002c02000008000000c50300000a000000000000000000000071ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b44393c98e908dd90000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b00a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fed4aebd72fdebc6a8c2e158eb41423596b4"], 0x43e) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000000c80)={0x0, 0x0, "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", "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"}) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e23, 0x1f, @empty, 0xe96b}, 0x1c) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, 0x0, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r5, 0x1, &(0x7f00000000c0)={0x240, r3}, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0xc0709411, &(0x7f0000000180)={{r4, 0x2, 0xfffffffffffffffc, 0x5, 0x3, 0xfff, 0x3, 0x1, 0x9, 0x3, 0xcf, 0x1ff, 0xf834, 0xd46, 0x1}, 0x10, [0x0, 0x0]}) 07:18:36 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0xa, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getsockopt$bt_BT_SECURITY(r2, 0x29, 0x3e, 0x0, 0xa04901) 07:18:36 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0xa, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getsockopt$bt_BT_SECURITY(r2, 0x29, 0x3e, 0x0, 0xa04901) 07:18:36 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) syz_io_uring_setup(0x2de1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ocfs2_control\x00', 0x20002, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd=r2, 0x0, 0x0, 0x9899, 0x0, 0x1, {0x0, 0x0, r3}}, 0x7fffffff) perf_event_open$cgroup(&(0x7f00000002c0)={0x4, 0x70, 0xff, 0x4, 0x0, 0x7, 0x0, 0x8, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001, 0x6a740753}, 0x84, 0x3, 0x7, 0xd65acf6e3a9bd0c, 0x5, 0x400, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) 07:18:36 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x24000021, &(0x7f0000000a80)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) splice(r3, &(0x7f00000000c0)=0x2c6, r0, &(0x7f0000000580)=0x1, 0x2b7, 0xc) dup2(r1, r2) 07:18:36 executing program 5: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:36 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0xa, 0x3, 0x2) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r2, 0x29, 0x3e, 0x0, 0xa04901) 07:18:39 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:18:39 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0xe0, 0x3, 0x268, 0x22c, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], [], []]}, 0x43e) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x24000021, &(0x7f0000000a80)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000007c0)=@filter={'filter\x00', 0xe, 0x4, 0x3c0, 0xffffffff, 0x1d8, 0x0, 0xd8, 0xffffffff, 0xffffffff, 0x2f0, 0x2f0, 0x2f0, 0xffffffff, 0x4, &(0x7f00000000c0), {[{{@uncond, 0x0, 0xa8, 0xd8}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x1}, {0xffffffffffffffff, 0x0, 0x4}, 0x5, 0x5}}}, {{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@frag={{0x30, 'frag\x00'}, {[0x4, 0x5], 0x4}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}, {0x3, 0x2, 0x0, [0x9, 0x5, 0x81, 0x8, 0x1ff, 0x84, 0x6, 0x0, 0x7fff, 0x3, 0x8, 0x9, 0x0, 0x4, 0x7, 0x3f], 0xe}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x420) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r2, r3) 07:18:39 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0xa, 0x3, 0x2) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r2, 0x29, 0x3e, 0x0, 0xa04901) 07:18:39 executing program 5: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:39 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = syz_mount_image$afs(&(0x7f00000000c0)='afs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffffffffff9, 0x2, &(0x7f0000001200)=[{&(0x7f00000001c0)="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", 0x1000, 0x5}, {&(0x7f00000011c0)="956ea49bdfbc26eec7da6b80dc69a69a74cb1ffd572be44bc610e0e07d641f67dd8488d406aefd1730180d526b696f4d491b76a671d867f45d46ea33dc19cada", 0x40, 0x5}], 0x800, &(0x7f0000001240)={[{@flock_openafs='flock=openafs'}], [{@func={'func', 0x3d, 'PATH_CHECK'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/sequencer2\x00'}}, {@fsname={'fsname', 0x3d, '{^{:-'}}, {@obj_user={'obj_user', 0x3d, '\x95#-['}}]}) sendfile(0xffffffffffffffff, r0, &(0x7f00000012c0)=0x8000, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xe, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) 07:18:39 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) r0 = syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x0, 0x40000) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) write(r2, &(0x7f0000000180)="34a2f98c3eee7abb5cb10283dfc33d9428", 0x11) [ 727.636478][T21031] loop0: detected capacity change from 0 to 264192 07:18:39 executing program 5: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:39 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0xa, 0x3, 0x2) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r2, 0x29, 0x3e, 0x0, 0xa04901) [ 727.713243][T21037] x_tables: duplicate underflow at hook 2 [ 727.722259][T21031] kAFS: unparsable volume name 07:18:39 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x29, 0x3e, 0x0, 0xa04901) 07:18:39 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) dup2(r0, 0xffffffffffffffff) 07:18:39 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/830], 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext={0x400000005}, 0x0, 0x0, 0x0, 0x0, 0x20, 0x80000001}, 0x0, 0x10, 0xffffffffffffffff, 0x1) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) 07:18:39 executing program 5: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) [ 728.501233][T21041] x_tables: duplicate underflow at hook 2 07:18:42 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:18:42 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x29, 0x3e, 0x0, 0xa04901) 07:18:42 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) preadv(r1, &(0x7f00000003c0)=[{&(0x7f0000000180)=""/108, 0x6c}, {&(0x7f0000000200)=""/26, 0x1a}, {&(0x7f0000000240)=""/77, 0x4d}, {&(0x7f00000002c0)=""/211, 0xd3}], 0x4, 0x3, 0x9) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) dup3(r0, r0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r2, r3) 07:18:42 executing program 5: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:42 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) dup2(r0, r1) 07:18:42 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0xe0, 0x3, 0x268, 0x22c, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], [], []]}, 0x43e) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e22, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) r1 = gettid() tkill(r1, 0x16) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0xfc, 0x4, 0x7f, 0x1f, 0x0, 0x7b80, 0x810, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f00000000c0)}, 0x10122, 0x6, 0xffff, 0x1, 0xffffffffffff7dfe, 0x1, 0x3}, r1, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r2, r3) 07:18:42 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x29, 0x3e, 0x0, 0xa04901) 07:18:42 executing program 5: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:42 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x6, 0xff, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x14100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) 07:18:42 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) r1 = socket(0xa, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r1, 0x29, 0x3e, 0x0, 0xa04901) 07:18:42 executing program 5: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:42 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x6000, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ocfs2_control\x00', 0x100, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xa) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r2) 07:18:45 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:18:45 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) 07:18:45 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = socket(0xa, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r1, 0x29, 0x3e, 0x0, 0xa04901) 07:18:45 executing program 5: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:45 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/830], 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) 07:18:45 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="cc00e003680200002c02000008000000c50300000a000000000000000000000071ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00"/1086], 0x43e) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nvram\x00', 0xbc803, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x2, @perf_config_ext, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) fcntl$getownex(r1, 0x10, &(0x7f0000000180)) perf_event_open(&(0x7f0000000100)={0x1, 0x75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1000000000000000, 0x0, 0x0, 0x400000000, 0x5, 0x200}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000000c0)=@ccm_128={{0x304}, "b871070db21aa524", "1c8c0edd30d507cf07544b7c8655db8b", "b5d239f7", "720fbd1d65bb1ee7"}, 0x28) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r3) 07:18:45 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket(0xa, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r0, 0x29, 0x3e, 0x0, 0xa04901) 07:18:45 executing program 5: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:45 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x33e) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) ioctl$F2FS_IOC_FLUSH_DEVICE(r1, 0x4008f50a, &(0x7f00000000c0)={0x5, 0x8}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x24000021, &(0x7f0000000a80)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000240)='westwood\x00', 0x9) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000180)={0x3, {{0xa, 0x4e23, 0x5, @mcast1, 0x1}}}, 0x88) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r2, &(0x7f0000000ac0)="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", 0x1000, 0x4000090, &(0x7f0000000280)={0xa, 0x4e24, 0x80000001, @remote, 0x3}, 0x1c) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r3, r4) 07:18:45 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0xfffffffffffffe7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ashmem\x00', 0x98000, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e23, 0x1, @remote, 0x5}, 0x1c) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000000c0)='*\x00') dup2(r1, r2) 07:18:45 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f00000017c0)=ANY=[@ANYBLOB="cc00e003680200002c02000008000000c50300000a000000000000000000000071ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00000000000000000000000000000000000000000000000000000000000000000000000000ffffff7f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cd76a385a7263639000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2cc7cee4511000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000076afc4ef11e0b786938f1f260ffd2f832f17c0a21a3ade5500f26d1c59abd375dee77283e5bc851de423db134bfdc3"], 0x43e) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = fsmount(0xffffffffffffffff, 0x1, 0x1) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f0000000180)=0x800, 0x4) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000007c0)=""/4096, 0x1000, 0x2000, &(0x7f00000000c0)={0xa, 0x4e20, 0x4, @private0, 0x4}, 0x1c) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r3, r4) 07:18:45 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r0, 0x29, 0x3e, 0x0, 0xa04901) 07:18:48 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:18:48 executing program 5: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:48 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() r0 = socket(0xa, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r0, 0x29, 0x3e, 0x0, 0xa04901) 07:18:48 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0xe0, 0x3, 0x268, 0x22c, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], [], []]}, 0x43e) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x20, 0x68e002) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) 07:18:48 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x27) geteuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) 07:18:48 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="cc000000680200000000000008000000c50300000a000000000000000000000071ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c6b59f17353ce5673ca12600"/830], 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) 07:18:48 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) r0 = socket(0xa, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r0, 0x29, 0x3e, 0x0, 0xa04901) 07:18:48 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/819], 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) 07:18:48 executing program 5: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:48 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0xe0, 0x3, 0x268, 0x22c, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], [], []]}, 0x43e) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)={0x0, 0x0}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x5, 0x5, 0x7, 0x1, 0x0, 0x401, 0x420, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x400, 0x9}, 0xc806, 0x3, 0x80000000, 0x5, 0x7, 0x489, 0xc1}, r1, 0x6, 0xffffffffffffffff, 0x9) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r2, r3) 07:18:48 executing program 0: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="cc000000680200000000000008000000c50300000a000000000000000000000071ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c6b59f17353ce5673ca12600"/830], 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) 07:18:48 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket(0xa, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r0, 0x29, 0x3e, 0x0, 0xa04901) 07:18:51 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:18:51 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket(0xa, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r0, 0x29, 0x3e, 0x0, 0xa04901) 07:18:51 executing program 0: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYBLOB="cc00e003680200002c02000008000000c50300000a000000000000000000000071ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b44393c98e908dd90000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b00a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fed4aebd72fdebc6a8c2e158eb41423596b4"], 0x43e) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000000c80)={0x0, 0x0, "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", "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"}) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e23, 0x1f, @empty, 0xe96b}, 0x1c) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, 0x0, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r5, 0x1, &(0x7f00000000c0)={0x240, r3}, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0xc0709411, &(0x7f0000000180)={{r4, 0x2, 0xfffffffffffffffc, 0x5, 0x3, 0xfff, 0x3, 0x1, 0x9, 0x3, 0xcf, 0x1ff, 0xf834, 0xd46, 0x1}, 0x10, [0x0, 0x0]}) 07:18:51 executing program 3: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) r0 = geteuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x40020, 0x56bfd963a9be347c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x6}, 0x0, 0x0, 0x1, 0x7, 0x8}, 0x0, 0xe, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) ioctl$SIOCAX25GETUID(0xffffffffffffffff, 0x89e0, &(0x7f00000000c0)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r0}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) socket$inet(0x2, 0x1, 0x6) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x100, 0x0, 0x800008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000200)=0x28, 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) ioctl$FIGETBSZ(r3, 0x2, &(0x7f0000000180)) dup2(r1, r2) 07:18:51 executing program 5: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:51 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000001800)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) pipe2(&(0x7f0000001d80), 0x80000) sendmmsg(r0, &(0x7f0000001d00)=[{{&(0x7f0000000180)=@tipc=@id={0x1e, 0x3, 0x2, {0x4e23, 0x3}}, 0x80, &(0x7f0000001780)=[{&(0x7f0000000200)="ebe95dc8d62d81aa3d140bda0140a813027fef1af0d3c876d5c95602f3f7eec3ccbdd79c5895555da78ee59c440f52450ae7a75148223adfc69ec9f9e0fdf4c7fc5c30cc069492216e4bc5329838d60f7bd1b20a4496cfb24ba01ce82d0c5e8a07a0bcd1d61c3fc57eb3ff080d", 0x6d}, {&(0x7f00000006c0)="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", 0x1000}, {&(0x7f0000000280)="430d8697fc0c26760b44de7bcffdf98556f56ecec8c5db970849fcdae9bec1e37b475c2e1b3b06304c9fb1c39916addc905c7143c222ef4e6a8141d1e4ce6fc2c683afbf6e8230af8870ed48603637b8ae2e30cadcbe1e6f569f0c1f418b222e0bd43f7fbf3c5e229dca8effb0fb83d36052668934313c5c61b9a7e438af218fdac61747c49d678c57b21a57be012158f66e5b3d5e155585a4dd5cec94546943b33138da1172b3fa12cd16af585599e8a2e380d6e7bfcc07a0f772cca34054e7163110163f2eefdcee46a92ee4aa4f6780c3bb7c7b9d375839e64f8f895397813e28943d16321c9e7ca668136987cad9c1976d8c6b", 0xf5}, {&(0x7f00000000c0)="fb8386aee067b2910cd175cfe004185189c7dfcba5b07d69", 0x18}, {&(0x7f00000016c0)="fe9ca8cc1a1f3b1a886ebe8b1743fedf8a24d57f034bb4c63d6b0d9196b78f842b31f35de6bc9f6e26eb2f10f9b9f406fd46bab58acd91", 0x37}, {&(0x7f0000001700)="845bf466bc4fdbaa5e6fafde1210d3ade56f3fd4879b2e558f462e7242e608b53d57f86fc312684db1d892de1a4be355ecf8f678382fac3224389c9c8f19321b8d0cc7c49e4c51617bda946c64be", 0x4e}], 0x6}}, {{&(0x7f0000001840)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x1, 0x3, 0x4, 0x3, {0xa, 0x4e24, 0x101, @local, 0x800}}}, 0x80, &(0x7f0000001a40)=[{&(0x7f00000018c0)="8c86ff97f4717302fdd4fac217a680074c2db111ae967c5dbf6df5697905222c16ccbd305920ff8284e77f7c", 0x2c}, {&(0x7f0000001900)="f2fe20420ebd122379654c3d7d89a5b0661bc99023f8107a70824b78c9d2153b6dff6798f744", 0x26}, {&(0x7f0000001940)="de2b106c2dbf722e72a155298d85c3ccc20245e034766ed87338335d1ef86fc3204201575dd9786ddb307a9e02ec534ce8d1d47bf4bd8edfd1a66ac634435663f331274f776f1cd0c77720d33fcbf12ea354e224318fdde4fa03c98852e97bf1ce2273a31ede61fe008b50d24a735ebbd4912a620459ad1fe143b38c702909cf", 0x80}, {&(0x7f00000019c0)="54fb118abab131d6021d1794b0b004f9db4e041892f54539de3fdd", 0x1b}, {&(0x7f0000001a00)="020a657982e56251c2e303b6b36a6b6a00", 0x11}], 0x5, &(0x7f0000001ac0)=[{0xc0, 0x111, 0x3, "d21752599f9f7492155bb6716442e6708dcf7267083790b47a81b0b46014d9f6e64150ef1f735d41ca325307583fcd2862a755282cc433d494116b3010e6b48cf50eb9a3b2b022a5c5c097e8d620d9f7efb2fbc98d1396d3dcb53d7b16c1fb112e29b61b4164ba244f4025c93f2f94c750c738938a1e3da41e1e599a9f5639ebf0f4b4ebf4b60e46fd9d5cbdaec413ce7a38733572043eac88dd580dd762c3f62221013b9ec4a0b6c9140afd827d"}, {0x38, 0x103, 0x3, "af825c7fb68f9a4e091a43410975142c5a04508387140c575e5fab3a8d96e2193ff709"}, {0xe8, 0x6, 0x2, "f59ae76e7eed3bb1176e8a79864a9fa6f493b400f05d89a7a20304cce74595db57410ec3af0cf0d734f8f69c7e15af5e09199aa1bd53ff4a7a335b17640ef6dd21188a76e0ff9d2c1c41babd934410ca209dffe11e5b43a47be69ac1444425718cba60601b1002248159b68ac9087cbb58312af2f372a8966d9c36b65ca865439235c2e9a9736ed537c07e9516a93206b58aad236f83348751520d2d9c05b61d30cfa4c0e7ae7c93afd0aa6d3b6d7ebe0af27b4564365402689d93ada649df6232776c1e2a33829b5c2590b92567e16f15337929014768"}, {0x30, 0x110, 0x9, "ac59ffe0fdfb81a3e2e736daeebe35c704f4fd016f17b7cb6b70"}], 0x210}}], 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r2, r3) 07:18:51 executing program 1: r0 = socket(0xa, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r0, 0x29, 0x3e, 0x0, 0xa04901) 07:18:51 executing program 5: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:51 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x2) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/225, 0xe1}], 0x1, 0x3b8e, 0x7fff) 07:18:51 executing program 0: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYBLOB="cc00e003680200002c02000008000000c50300000a000000000000000000000071ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b44393c98e908dd90000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b00a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fed4aebd72fdebc6a8c2e158eb41423596b4"], 0x43e) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000000c80)={0x0, 0x0, "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", "736a1f6e7cbfb71893a669b404b1b2f92ad1e18617fdf06e577804c6de4b60c3ed9990cc6619d16d27dedd267f84d2c9217b852f755851e9bc80b0038acf0e261d6008f84f8e736ec5f3892a8f8e2d1c2f7c26dba3f5d20534e5bafec00b18b8e86837a29b50baee555c9b225bc4be8c5791cf50d25c3e7fa9b64b5812f1c732bffc1bcc0a2aff0b9b664a4e9d1b2f8689acb7707cb64c1473b3b626cd6153e35f6ce5792469007a924320d470b83d6c32f40e6f138d447a4760cbb2050374484543a897321c0f275c9b4a8f0e21f25d8ad92e0148d2787997c9f83eb1d5f11afd7ac188839fafb498df560e10ea10e7767c662eef3fd2a359800b5d1c21faa31a834debd0b533c632c19e72255a7b302b1000ba8e33d4f5a09a2264531625f3c36137c10421272c0dc0f3f4da01b29c3262472269d006941b097db5ee4cba1a4619702b9193579467327beb1c5b358e85662a63aeb1ec1d307d2492d831d5d43afaa929ebd83a97c9e594ccd93943b21bcf3da3cec88742c7b458d544b382b404069729ad840b3aa1e940e23d14ac451bfabb2e48975f3c9cec396dbb052e24fd92bb7214c093bf932aa4e708c20cef082b3461e54a6752f35b0a8bf810f0e915b509d198811cd887d7acf9813413e032e167a50fcf5d17913da0c2e6e247100b3e739611dd901bbb866bf04079855bf2c376f546958439680d2bd8bd181ee777e7bbb62c02d3dcbeef3f5883dc07009732672c3b5c97cc41b24c7acda1f4fd97a6784181d6a7a20a044ea2d11e39c6481f572449f18b693cb40aeac3e3ff04caa20bd8479bc26084f2e41474f5d83bd0901f82f72b5c7edb011beb4aef64a8f9a5d4a72366c980c3993128438a2b00a61c80c026dc469110cdab721739fd314cac9ca4bda036ae20a5dad859177ca4308a350d82ff6ec7ba51eccab14c3acaa524f30bbcbc05242f2616c9fce8225ea1236d5f68e7c6c7a44d2965f2207af45740cdcfb1a039bcaf8e7e664fb69d477be505db2ed601c68ed22fbeeb4867d2dc4eae72d00fdbf97ddb8b3dde1569d1bcc3afef4c5df203cf71ac3952945ce5c7d73d9b5e460f167c89e19b90fb8551dc8656ce43707c1a3d89a1445bf7254c433fca99484a83f4688b415b9cc0ff7fd7c5a7c013f9503f6b03430077c338374109a7dbc4f8a5244993c21bd5d4cb758030d1fb17193e1ce08f4f00356f98f2be1e7cf0372bf28e407a734045c62090b9fa5f63daf75b691be6fd843e697def61dddd85e24e09545104c28673cad62f9494cf0574c33552b89d5ac8241431c2bda1b5c7a0d993d6fa353d0925e6dbc031cf88a1bca9d935a153b9eefbd1bd5d584b4c5937a27f90ad391a039f36d396c495e39b9839e201710764c219d26ba14e120eb3603910a3afceb46dd2978d82cd987cf6092f4b78e6b74947420c3a66647835c4b0e01d852e7458b4fb5e836510fc3823e6c59903728714d9ac80e59b06e557ee50604803f1e98322786ed8582eabe4da69a6621531084e283ee4d00abe4a5bb99ea4150bc5d6f38479fd1e2bfab7ffee7048320e32746b8034f4bc425c3be7fdfeebf6fc0b20e8d3dd3c6f2f25264ab74ccef833408cf541e23ac3b737313be03a8299666e6a88cfa3782fc50eb90227766eb846085cee866972cea0d2a06d16a03723b9449cb2cebefd500253dc23adf2fc586fd7152087f88a8fd5650677ab0785299dced37cfc7926d26379d90c73357d348f5e59ab323c9c682043603aa13bcfe703a64be0bdd996769b2c831f90b3ce01cbf49c9966b90c6233a7c0a339b20f547b9efc804530646bdc8ad1d79eab76a8c2d258d94bd57653dba6ddcceac31f824892f0ed649049c860800cc085c55227d7d621a86e6be041b5a6dc1eb4e945a0e0f0bd462c3da7b68dcd6e39a81691a8e57d71104518d6e2e60238535d347f5fae971310fb7bb94598c8b20a2b6e7b053385ad6443ca0289b36ef0c09202d0c360be82e89202e1ba9a7cdef24fda8ac20469b26a0092dbaf71cfb694c6201c9301d9cb77c45b34e84fd1a49c852fde540449949ce73e57ef0e20cfcc5bd8e48b98e94b56664e181b48cfc46952a363ef4483cc57ba66f7153340575eeec23ed1869320df1ffc12cbfdb41265af647021a0a0001405d20b59333de14ac06946a4fb0031a5bf4d95cc93032f6260e38b44f6cf57eb7b17edc2c427d72b0e402a0655fbed5b7882a80d17718a796523a620f350f6b20737fcea16728ec021bfd6f5d7a58b8e7a06f9630f4d23d227e434bd86973a058839780e1a050332e9883416d659d5260ba49b3cf3e33b5b3923ce83d135acedbc7c60544c7e20a15a8cb67ff61d09d0ddb2a25bb85e53ca293964e5f4690caa2676d2eb78e4d89891f3ef9687db5d36e4fdb106aa29cfa4040f522bc576444babb81877458ab8a19a7025db602431677924ad8615356a86182ad018cb25df8d38a012cf527a0aa5a3d43cc95eaf0c9bfa3295bd24ec427ed55d7a84dae382a74892cbb39e9d222806e6882a663c53cfd302220dac10608e3dbdc1b67c1121b99e4add6a32997ada6ae50c2813c94b5464a2e9513b9d334b608b75ba65aea71f9714ebc95078ab2bb5350ba9c73f31b48c9dae98169a921f73efc1a2e9733ff24787682c0acff15d853639b05c82187f35eda45498ebdca1dd6030f6e92e3221fb82f777e2d1af261f59a51615c223107d0545c0d4583ea667adb38d5517c5773cbdf35702957c08b36fd945d6b2af38e8cd2d60b9e71e80af229bd413f9eca34ebae09709e27c2cd9846e01c2d98640c665fdb040f895e30f157559610d8975327cae61f505f5fd88e9ed31d64e0d718f195aac4c316d597f2e96413310190c2dd6e2078cda80099ff2f07c5ea55a46027d7b1a844239a758e43a8d74fad93a0d2af2312e7bdcbc6622485a9fc8678707b7652539f603cc7ecdd551acdf2106ba5bb81d9192fc220d9f5dfc4e858ec61caae0e87e62dd5a902556ab4ac754368798f7e2d5f8e55288ba94bca21b19fe3fdd53fc2f3a315140107b2f7fb46e939723b0687c7016ebe2086785f2d689aba3a48f0fe86c4a1549c57998670b742a487af05c3363195f663ea28a33e1a6407d352102a52567a4ece82c5fdd10b7387260dc4766bd190808e339722ee920f747eaf6d37a453eb54fa70740366ec643bd27b94a2f6099f06fc6946c776ade6627d5d766c049cf1f36edcfe19ae3f833e86205d39125cafe4d6fc41e1d9046fd0adfdd8c305c7f8518f11db6f2a2f006fe1af4c0a53ce4d3187ebf9ab2a662525ebbb107669802f5e6373a147f7e559f271986b89f449ca6a1ba973300b87a1c395018dc0ad411d17f882437dfd12dd758e75e7f85a08be4411950bde89d962738a9a5a3f2368622104a7011cdc4d4b7481d478596a9159b374d388ef9cb08d2368174eb06b0bb777758c2cc3499f621c08e6ddf879497ff4a546e40d798c001c7f61207f7c5828d4f27e08cfe72d3eec7e6612bd29783ecdb269888e2f590ed2616b57533435ff76839d923a1610a1b793f61d8a42a6b5d0ef5be1c02597f444802e78da36e07019d2354ea843de11b241a2dd9fb3c51838e1032a594491ce00115c2bfbaafa57921e944d718093394b8ea76e76eac88580987f3e08f79e3b76bfccb34b83a20f3e98dd820a83b1b95cf0d1ca60d5b968aded36810628cf0e5b982c6d3ea0d9e1cd438fccb431ac5a8f21b57a5b78bddb0c3700582dc3a172f54d301e2c1be48e4c87ca6c4b8c1d7a4512bdbd41fcef2ed4459a410d9344cdc6eae42817c997693690c9fe56d1ad2c32eee9f067e02d3c917d4541052c25f12cca076eb4265ee2825a1ffb9082bcf4799bfd8e7ffdc180b47e4e383a7177013cb1ae3916503e9c3fd5655183c50892711d67f31e54a2e42ffd0bfcbf92a0cadbf094f4a45ef3fb522888d26287784c7be395f1af1bcce6d403fad87cb2a7d5f50451dd2ff63e13e6bba7010b54b828e41dd5c287dd3b7ae5c5a5b72c138017b7eaebef12cac62d80010c8294f56bca0de2446fa95522b90ba7efa4f8b87a2426aa773dcf0dd7acd78aeb502f45bbfd847bf5557f8b40beb8c99571a5b8a18d087d0a787013610f5a2e126f825cd40164a4894a71fa59260628816596a1a14365f0233416c22c4d8257f6d238f2fd473f5f567e2c5193f184e0140a09de8360b1447cba9da8fd452523c0b34e17f99b8fa2a1ffc8cce493041755ee7569f5307f13f63cb1d86ff2856b8f5b1487bceb93012a0793b7b9f211136e44fe34523bfa986c185e2a1c1a59ac29cf365f04ccd3c2de8d7deddee8a0991c965bee8794cbed04056e073491d9420ccabfa9e184446b271ef6a8250bc64034353054638a8a5f7528f6bdccb20e8367dfcd4cb547bbae087621c980a71cdbe2dca83ce9a05a3c6b2e9689c53c8b30e687e8c6ca2c75d97806f19416008deaa53494c103cc0ed0a7f0f079e2e2dd5d07170248f1ed0bbfeb716348a8f197d95c1b6710884ac13157c4ce23f997cee3aa9bf9486afe3437ca9409d03aca3ab8d8fd0af7f148ef6bcc952ef633514504acc84ba639129276cec8234b84098c357bee86ef9afee8cfc0ce1bbd4b212ace83a16a92e43a432cc14829a0f744481fac8cfe694573d6773931d13b10e092db01b5269b50951ae488c3f88b56ad979efd2efb6c403186db3182b3dcd05142b094ad1918d30130b97b84033f87f910278a473c26bb1e35f2943d7f354464d12ba1b7fa48f6d4a7f242937d99a1fcaf0a7027727e07914840a2acd525c4d2df95be455420796593e02e1a4a636099308619634a809ccf20c7b6a80d2fb80cbc34eba0994cf9e7d9d4a33fce3bf4d8a87304332a8260a9d7f79f0e3c396638f2a45bf100c2ea963d05a10119e0dd053fae88a344637c91a8ab7599a1e18d025516190842b6f585c4e4b14c107fb4fc1ada765280ed23319f9cff4eeb945aee379e94fe4b5af10f93620a32b874d34149bc341a531bd64a3a7660e80a45ee799c3ef1e57febb084d32cf56593652c95c0a6e50b93ba0c11e987af167cf5c08bc158524b46f507dfd438dafa4f986fd46898af1a170e49521536e62d5c63321d549f729ecee9124e2f600a37f5293755783f709ffc5c74f16d040a90bd99b3fba8c8d9b676874aeb5416de108aa40e657bec3c1a33ebb54552a7f59c117ef549eb4d40d90d2c14e12a57e6ad40323b7e4cf06a1c04fcd784374f0d99fd9afe035c0052d17fdfda2c57d06dc0c7cce07304e581043dfa6334c2a834379aef1d58462636717a1e8fe27b10b2673db7f21aed0a4aadd9467304566cd5b1c60352824921f1789b72da3ee18b0e52878485f2b793a9fc1ed3a5b240fb36c856b"}) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e23, 0x1f, @empty, 0xe96b}, 0x1c) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, 0x0, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r5, 0x1, &(0x7f00000000c0)={0x240, r3}, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0xc0709411, &(0x7f0000000180)={{r4, 0x2, 0xfffffffffffffffc, 0x5, 0x3, 0xfff, 0x3, 0x1, 0x9, 0x3, 0xcf, 0x1ff, 0xf834, 0xd46, 0x1}, 0x10, [0x0, 0x0]}) 07:18:52 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/819], 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) 07:18:52 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:54 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:18:54 executing program 1: r0 = socket(0x0, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r0, 0x29, 0x3e, 0x0, 0xa04901) 07:18:54 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/830], 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740)='/dev/loop-control\x00', 0x80, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) ioctl$IOCTL_CONFIG_SYS_RESOURCE_PARAMETERS(r2, 0x40096100, &(0x7f00000000c0)={{&(0x7f00000006c0)={'GENERAL\x00', {}, {&(0x7f0000000300)={'GENERAL\x00', {&(0x7f0000000240)=@adf_str={@bank={'Bank', '4', 'InterruptCoalescingEnabled\x00'}, {"26e7ed190f75d42b8424b76b270bb88f46d1cd8578b55e98df446c42c14c8cb472b958c456ae4c60e5ee389ffd089814f903900663ce388460c25cbcc625f3ab"}, {&(0x7f0000000180)=@adf_dec={@normal='NumberCyInstances\x00', {0x401}}}}}}}}}, 0x27}) dup2(r0, r1) 07:18:54 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:54 executing program 0: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYBLOB="cc00e003680200002c02000008000000c50300000a000000000000000000000071ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b44393c98e908dd90000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b00a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fed4aebd72fdebc6a8c2e158eb41423596b4"], 0x43e) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000000c80)={0x0, 0x0, "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", "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"}) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e23, 0x1f, @empty, 0xe96b}, 0x1c) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, 0x0, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r5, 0x1, &(0x7f00000000c0)={0x240, r3}, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0xc0709411, &(0x7f0000000180)={{r4, 0x2, 0xfffffffffffffffc, 0x5, 0x3, 0xfff, 0x3, 0x1, 0x9, 0x3, 0xcf, 0x1ff, 0xf834, 0xd46, 0x1}, 0x10, [0x0, 0x0]}) 07:18:54 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:54 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:55 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:18:55 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:55 executing program 1: r0 = socket(0x0, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r0, 0x29, 0x3e, 0x0, 0xa04901) 07:18:55 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) 07:18:55 executing program 0: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/818], 0x33e) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0xe, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) close(0xffffffffffffffff) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000180)=0x14) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) 07:18:55 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:18:55 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:55 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:18:55 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:55 executing program 1: r0 = socket(0x0, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r0, 0x29, 0x3e, 0x0, 0xa04901) 07:18:55 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:55 executing program 0: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/818], 0x33e) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0xe, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) close(0xffffffffffffffff) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000180)=0x14) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) 07:18:55 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) dup2(r1, r2) 07:18:55 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:55 executing program 1: r0 = socket(0xa, 0x0, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r0, 0x29, 0x3e, 0x0, 0xa04901) 07:18:55 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:55 executing program 5: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:56 executing program 0: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/818], 0x33e) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0xe, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) close(0xffffffffffffffff) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000180)=0x14) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) 07:18:56 executing program 1: r0 = socket(0xa, 0x0, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r0, 0x29, 0x3e, 0x0, 0xa04901) 07:18:58 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:18:58 executing program 4: ftruncate(0xffffffffffffffff, 0x1) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "1487668614c641d3", "2424c073983d8ce1b03ceaf5592dcd80", "f077a520", "77bf2c000ca4fd34"}, 0x28) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) pipe(&(0x7f0000001900)={0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r3, &(0x7f0000001a40)={&(0x7f0000001940)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001a00)={&(0x7f0000001980)={0x70, 0x0, 0x800, 0x70bd2c, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x5c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @dev={0xfe, 0x80, [], 0x44}}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private2={0xfc, 0x2, [], 0x1}}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @remote}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private0}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x10}, 0x0) dup2(r1, r2) 07:18:58 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:58 executing program 1: r0 = socket(0xa, 0x0, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r0, 0x29, 0x3e, 0x0, 0xa04901) 07:18:58 executing program 5: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:58 executing program 0: write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) geteuid() r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x1414c2, 0x0) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) setsockopt$inet6_buf(r0, 0x29, 0xcc, &(0x7f0000000180)="88109a038625a47131e2829bda6edb0860e1402c59581d0431b4c98ac38ec9c3ac488a748153b599ca2185d792d06e26bccaa0c8be9c26574f60b1c09e2c9dfa7a5403e8fac6394e93077aba14ff8d3400977d526ec1582b844a727326eaf71417adc8f8dc681f70", 0x68) writev(r1, &(0x7f00000005c0)=[{&(0x7f0000000200)="3563211166368eb82d768acc0955beb452dbf7de1f5a7f96713b4d9b6e86bd03ebd556f8", 0x24}, {&(0x7f0000000480)="ac3e082e77b8d06b901e05dd296e8bb9c5eef6f7d3b9b31b7906f535b8248734881996a9aada2a3403bbc543ebe7764f15fc07ee6b3ce78806e1c11d5553e2fb3b40f446faca15cf5bb1d5155e8667ddbd62224df363e95a4d59eb5375425fae7e6add", 0x63}, {&(0x7f0000000500)="9adda542840af396f7e796f6c1f4145ceb01af8b8e36d7bafa93742fdd027850492790f958ce73b30546f3ea0137d8c41c72f5d6485c8624220cc3608757752406c127976105d4ac452e524fa3911f2302f5defd03d657260f48ba2de47137ad46018d40da54feb52ccfe03d6ec51c5c51063e74b6f1b368bdfa10bfcc0a1d824e522fa984ac7ded8c1c915a01ec27edc92e20fcbb01fa11", 0x98}], 0x3) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x6000650) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000280)) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r2, r4) syz_open_dev$sndmidi(0x0, 0x2, 0x200202) [ 747.060593][ T3251] ieee802154 phy0 wpan0: encryption failed: -22 [ 747.066960][ T3251] ieee802154 phy1 wpan1: encryption failed: -22 07:18:58 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:58 executing program 5: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:58 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:18:58 executing program 1: r0 = socket(0xa, 0x3, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r0, 0x29, 0x3e, 0x0, 0xa04901) 07:18:59 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000006c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext={0x80000000}, 0x0, 0x0, 0xffffffff}, r0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) 07:18:59 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:18:59 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:59 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:59 executing program 1: r0 = socket(0xa, 0x3, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r0, 0x29, 0x3e, 0x0, 0xa04901) 07:18:59 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:59 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x33e) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000000c0), &(0x7f0000000180)=0x4) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x81, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) 07:18:59 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:59 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:18:59 executing program 1: r0 = socket(0xa, 0x3, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r0, 0x29, 0x3e, 0x0, 0xa04901) 07:19:01 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:01 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:19:01 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x2a0000, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x402000, 0x0) fsetxattr(r0, &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f0000000200)='\\#-\x00', 0x4, 0x1) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) 07:19:02 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:02 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:19:02 executing program 1: r0 = socket(0xa, 0x3, 0x2) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r0, 0x29, 0x3e, 0x0, 0xa04901) 07:19:02 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:02 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:19:02 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:02 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:19:02 executing program 1: r0 = socket(0xa, 0x3, 0x2) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r0, 0x29, 0x3e, 0x0, 0xa04901) 07:19:02 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:19:02 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:02 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x0, 0x0) syz_io_uring_setup(0x2de1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) syz_io_uring_complete(r0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x7, 0x7f, 0x81, 0x5, 0x0, 0x100, 0x8214, 0xa, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xffff8000, 0x2, @perf_bp={&(0x7f0000000180)}, 0x40242, 0x456, 0x4, 0x0, 0x8000, 0x4, 0x80}, r2, 0x3, r3, 0x1) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r4, r5) 07:19:02 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:19:05 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:05 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:05 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:19:05 executing program 1: r0 = socket(0xa, 0x3, 0x2) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r0, 0x29, 0x3e, 0x0, 0xa04901) 07:19:05 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:19:05 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24000021, &(0x7f0000000a80)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@empty, 0x43}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r1, r2) 07:19:05 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:05 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x8c300, 0x0) 07:19:05 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:19:05 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:05 executing program 1: r0 = socket(0xa, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r0, 0x29, 0x3e, 0x0, 0xa04901) 07:19:05 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x8c300, 0x0) 07:19:08 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000040)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1, @rand_addr=' \x01\x00'}}) 07:19:08 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:19:08 executing program 1: r0 = socket(0xa, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r0, 0x29, 0x3e, 0x0, 0xa04901) 07:19:08 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:08 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x8c300, 0x0) 07:19:08 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/830], 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x24000021, &(0x7f0000000a80)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f00000001c0)={0x3, 0x20, [], 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x24000021, &(0x7f0000000a80)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x4e24, 0xe7e, @mcast2, 0x4}, 0x1c) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r3, r4) 07:19:08 executing program 1: r0 = socket(0xa, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(r0, 0x29, 0x3e, 0x0, 0xa04901) 07:19:08 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) 07:19:08 executing program 1: socket(0xa, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x29, 0x3e, 0x0, 0xa04901) 07:19:08 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:08 executing program 3: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:19:08 executing program 1: socket(0xa, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x29, 0x3e, 0x0, 0xa04901) 07:19:08 executing program 0: syz_emit_ethernet(0x5a, &(0x7f0000000480)={@random="1f7336e05f2b", @multicast, @val={@void}, {@canfd={0xd, {{}, 0x0, 0x0, 0x0, 0x0, "49d5b7f06817ebbf8b1bf68aa3d5a102d684a60a9c81d377245ca10bf350dcc2a985f5bea287ce0eef37b66f3b902c6567290fac704b0391203c03bd169b2df0"}}}}, 0x0) 07:19:08 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) 07:19:08 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:08 executing program 3: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:19:08 executing program 1: socket(0xa, 0x3, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x29, 0x3e, 0x0, 0xa04901) [ 757.566404][T21575] ptrace attach of "/root/syz-executor.2"[21573] was attempted by "/root/syz-executor.2"[21575] 07:19:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000100)={0x79}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000180)={0x1, 0x0, [{0x0, 0x4, 0x0, 0x0, @msi={0x1}}]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r2, r3) 07:19:09 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) 07:19:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003b80)={0x11, 0x3, &(0x7f0000003980)=@framed={{0x18, 0x0, 0x2}}, &(0x7f00000039c0)='syzkaller\x00', 0x4, 0xf7, &(0x7f0000003a00)=""/247, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:19:09 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:09 executing program 3: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:19:09 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x0, 0x4, 0x1}, 0x40) 07:19:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) ioctl$BTRFS_IOC_START_SYNC(r0, 0xc0045878, 0x0) [ 758.115126][T21600] ptrace attach of "/root/syz-executor.2"[21598] was attempted by "/root/syz-executor.2"[21600] 07:19:09 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:09 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) ioctl$BTRFS_IOC_START_SYNC(r0, 0xc0189436, &(0x7f0000000600)) 07:19:09 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:19:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000dc0)={'wlan1\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000001180)={0x58, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_FRAME={0x3c, 0x33, @deauth={@with_ht={{{}, {}, @broadcast, @device_b}}, 0x0, @val={0x8c, 0x18, {0x0, "3a6811d3e5cb", @long="2aa2a420d5d146d911b06e52cc25aee7"}}}}]}, 0x58}}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x4]}) [ 758.384652][T21617] ptrace attach of "/root/syz-executor.2"[21615] was attempted by "/root/syz-executor.2"[21617] 07:19:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001240)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd, 0xd, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], 'A'}]}}, &(0x7f0000000240)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 07:19:10 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x8, 0x2, 0x5, 0x3f, 0x0, 0xfffffffffffffffe, 0xe, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f00000000c0), 0x9}, 0x10380, 0x2, 0x100, 0x2, 0x1, 0x1, 0x6}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x3) 07:19:10 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r1, 0x1, 0x0, 0x0, {0x7}, [@NL802154_ATTR_WPAN_PHY={0x8}]}, 0x1c}}, 0x0) 07:19:10 executing program 2: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:10 executing program 5: r0 = socket$inet6(0xa, 0x3, 0xff) ioctl$BTRFS_IOC_START_SYNC(r0, 0x89a1, 0x0) 07:19:10 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:19:10 executing program 0: r0 = socket(0x2, 0x3, 0xcf) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 07:19:10 executing program 1: pselect6(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), 0x0, 0x0) 07:19:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000f00)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000001000)={&(0x7f0000000ec0), 0xc, &(0x7f0000000fc0)={&(0x7f0000000f40)={0x38, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @remote}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_CONN_ID={0x8}]}, 0x38}}, 0x0) 07:19:10 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:19:10 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2={0xfc, 0x2, [], 0x1}, @private1}}) 07:19:10 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/830], 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) 07:19:10 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000980), &(0x7f0000000a00)={&(0x7f00000009c0)={[0x1000]}, 0x8}) 07:19:10 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:19:10 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x8f481, 0x0) 07:19:13 executing program 5: r0 = socket$inet6(0xa, 0x3, 0xff) ioctl$BTRFS_IOC_START_SYNC(r0, 0x89e1, &(0x7f0000000600)) 07:19:13 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x807, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext, 0x0, 0x0, 0x1000, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000200)={0x0, {}, 0x0, {}, 0x58, 0x5, 0x13, 0x8, "fc5032a06da3add08a2fc993bd403d1cac3e3252f332f6bb269974277faac79dbfc70d38eaae5faa6f07f6b2bb89ce005a7d896369c6379cf5539e88480bc890", "955c7f390a78301d700fa00aee0847b4860518e0737a5e1bc3da632ab6a44d65", [0xd2, 0x5]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x7f, 0x4, 0x2, 0x0, 0x1f, 0x220, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x9, @perf_config_ext={0x7, 0x1}, 0x1009, 0x2, 0x80000001, 0x3, 0x0, 0x9, 0x1}, 0xffffffffffffffff, 0xb, r2, 0x2) dup2(r0, r1) 07:19:13 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00', 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000002c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_KEY(r0, &(0x7f00000001c0)={0x0, 0xe, &(0x7f0000000180)={&(0x7f0000000200)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_IDX={0x5}]}, 0x28}}, 0x0) 07:19:13 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:19:13 executing program 1: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140)='nl802154\x00', 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_TX_POWER(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x30, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x30}}, 0x0) 07:19:13 executing program 5: waitid(0x0, 0x0, &(0x7f0000000400), 0x60000007, 0x0) 07:19:13 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200001, 0x0) accept4$packet(r0, 0x0, 0x0, 0x0) 07:19:13 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000040)=0x80) 07:19:13 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:19:13 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x100, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) 07:19:13 executing program 1: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb1\x00', 0x0, 0x0) ioctl$FBIOBLANK(r0, 0x4611, 0x4) 07:19:13 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, @val, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @empty, "", @local}}}}, 0x0) syz_emit_ethernet(0x2e, &(0x7f00000000c0)={@dev, @broadcast, @val={@void}, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast}}}}, 0x0) 07:19:13 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "75bbcb8d0f3a590cc1d96d9788fba35d14b64afad7eb2018a7665204dd1f450d1b741bcd8de2660a54337a47b290f289498ef285af7cf7929f06526cb12084e2"}, 0x48, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r0, 0xffff) 07:19:16 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:16 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:19:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000001d00)=[{0x0}, {&(0x7f0000000280)={0x10}, 0x10}], 0x2}, 0x0) 07:19:16 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43812, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4e01}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:19:16 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x6, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) 07:19:16 executing program 0: setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000000), 0xfffffffffffffcb2) 07:19:16 executing program 1: mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) 07:19:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = getpgrp(0xffffffffffffffff) sendmsg$netlink(r0, &(0x7f0000006f80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000006f00)=[@cred={{0x1c, 0x1, 0x2, {r1}}}], 0x20}, 0x0) 07:19:16 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8c300, 0x0) 07:19:16 executing program 5: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 07:19:16 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="cc000000680200000000000008000000c50300000a000000000000000000000071ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003a820e9d00"/830], 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) 07:19:16 executing program 0: sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, 0x0, 0xbce191f29129c94b) 07:19:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:19 executing program 1: socket(0x23, 0x0, 0x21) 07:19:19 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x8c300, 0x0) 07:19:19 executing program 5: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000001e40)='/dev/ocfs2_control\x00', 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 07:19:19 executing program 0: getrusage(0x1, &(0x7f0000001180)) 07:19:19 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a00808003168ffff1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000500)='/dev/loop-control\x00', 0xc000, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r1) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r3, r4) 07:19:19 executing program 5: r0 = semget$private(0x0, 0x4, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x7fff}], 0x1, &(0x7f0000000040)={0x77359400}) 07:19:19 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x8c300, 0x0) 07:19:19 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f000000ccc0)={0x77359400}) 07:19:19 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0x100, &(0x7f0000000000), &(0x7f00000000c0)=0xb0) 07:19:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:19 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) 07:19:19 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, 0x0, 0x0) 07:19:19 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x8c300, 0x0) 07:19:19 executing program 1: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x1c, 0x1c, 0x2}, 0x1c) 07:19:19 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1c, 0x1c, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) 07:19:20 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) 07:19:20 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:20 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)={0x10}) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r2, r3) 07:19:20 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000140), 0x8) 07:19:20 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001440)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f00000013c0)=[@init={0x14}, @authinfo={0x10}], 0x24}, 0x0) 07:19:20 executing program 0: r0 = socket(0x1c, 0x5, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000200), &(0x7f0000000240)=0x4) 07:19:20 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000640)={&(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=[@sndrcv={0x2c}], 0x2c}, 0x0) 07:19:20 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) 07:19:20 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:20 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = socket(0x1c, 0x5, 0x0) dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000200), &(0x7f0000000240)=0x4) 07:19:20 executing program 5: syz_emit_ethernet(0x188, &(0x7f00000002c0)=ANY=[@ANYBLOB="ffffffffffffaaaad16aaabb86dd6da11d0e0152290900000000000800000000000000000000fe"], 0x0) 07:19:20 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) 07:19:20 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000000c0)={0x0, 0x3, [@remote, @broadcast, @random="bd95011cfba9"]}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) 07:19:20 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:20 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f00000000c0)={0x0, 0x7a98, 0xfff7, 0x80}, 0x8) 07:19:20 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:20 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) r1 = dup(r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) 07:19:20 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xd, &(0x7f0000000180), &(0x7f0000002440)=0x4) 07:19:20 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="cc000000680200000000000008000000c50300000a007e6dfb2af4bf22452be03e4e5d1dd3a83c81b32db40000000000000000000071ac73a02a24a3a82b80b87af44dd3a02fa1ffb40af1c21c22e559ab6be28fbcaa5d4a03a76ae59e9d4c6e717f082a4db93f87e71fe600c9ba5d6c8625009b92db650c0682963dd1"], 0x3e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) 07:19:20 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f00000000c0), 0xa0) 07:19:20 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) listen(r0, 0x0) r1 = socket(0x2, 0x1, 0x0) dup2(r1, r0) 07:19:21 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:21 executing program 1: r0 = socket(0x1c, 0x10000001, 0x84) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000000), &(0x7f00000001c0)=0x8) 07:19:21 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) 07:19:21 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x902, &(0x7f0000000040)=r3, 0x4) 07:19:21 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0xcc, 0x0, 0x0, 0x268, 0x0, 0x8, 0x3c5, 0xa}, "71ac73a02a24a3a82b80b87af44dd3a02fa1ff31684e2d1c22e559ab6b00", [[], [], []]}, 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x3c41, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) 07:19:21 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x400, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) bind$xdp(r0, &(0x7f0000000040)={0x2c, 0x0, r2}, 0x10) 07:19:21 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@multicast, @empty, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "df05e4", 0x8, 0x2b, 0x0, @private2, @mcast2, {[@srh]}}}}}, 0x0) 07:19:21 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x0, 0x0, 0xff}, 0x40) 07:19:21 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/838], 0x33e) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd937, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote, 0xfffffffc}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) 07:19:21 executing program 3: syz_emit_ethernet(0x20000615, &(0x7f0000000600)={@random="1426f902e251", @local, @val={@void}, {@x25}}, 0x0) 07:19:21 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@multicast, @empty, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "df05e4", 0x0, 0x11, 0x0, @private2, @mcast2}}}}, 0x0) 07:19:21 executing program 1: syz_emit_ethernet(0x6a, &(0x7f0000000640)={@broadcast, @broadcast, @val={@void}, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @loopback, @local}}}}}, 0x0) 07:19:24 executing program 5: bind$netlink(0xffffffffffffffff, &(0x7f0000000040), 0xc) r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000fef000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) mmap$xdp(&(0x7f0000ffc000/0x3000)=nil, 0x3002, 0x0, 0x8012, r0, 0x0) 07:19:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r1, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB=' '], 0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f00000001c0)=0xc) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=@newtfilter={0x48, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0x1}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @private2}]}}]}, 0x48}}, 0x0) 07:19:24 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:24 executing program 4: syz_emit_ethernet(0x2e, &(0x7f0000000100)={@random="758dfb79bffd", @local, @void, {@ipv4={0x800, @icmp={{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev, {[@ssrr={0x89, 0x3, 0x6f}]}}, @echo}}}}, 0x0) 07:19:24 executing program 3: syz_emit_ethernet(0x22, &(0x7f0000000000)={@multicast, @multicast, @void, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @random="650ebb9ca276", "", @random="5cb8fe55e982"}}}}, 0x0) 07:19:24 executing program 1: syz_emit_ethernet(0x2e, &(0x7f0000000040)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x11, 0x0, @remote, @broadcast, {[@timestamp={0x44, 0x4, 0x18}]}}, {0x0, 0x0, 0x8}}}}}, 0x0) 07:19:24 executing program 5: socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x15, &(0x7f0000000600)={@random="1426f902e251", @local, @val={@void, {0x8906}}, {@x25}}, 0x0) 07:19:24 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg(r0, &(0x7f0000001700)={&(0x7f0000000280)=@un=@file={0xa}, 0xa, 0x0, 0x0, &(0x7f0000001500)=[{0xc}, {0xc}], 0x18}, 0x0) 07:19:24 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 07:19:24 executing program 4: getresgid(0x0, &(0x7f0000000200), 0x0) 07:19:24 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c}, 0x1c) 07:19:24 executing program 1: r0 = socket(0x2, 0x5, 0x0) connect(r0, &(0x7f0000000040)=@un=@abs={0x8}, 0x8) 07:19:24 executing program 5: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$sock_timeval(r0, 0xffff, 0x0, 0x0, 0x0) 07:19:24 executing program 4: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) getsockname$inet(r0, &(0x7f0000001540), &(0x7f0000001580)=0x10) 07:19:27 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:27 executing program 0: r0 = socket(0x2, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000001140)=@in={0x10, 0x2}, 0x10) 07:19:27 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto(r0, 0x0, 0x0, 0x104, &(0x7f00000000c0)=@un=@abs={0x8}, 0x8) 07:19:27 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) 07:19:27 executing program 5: fcntl$lock(0xffffffffffffffff, 0xd, &(0x7f0000000000)) 07:19:27 executing program 4: r0 = socket$inet_sctp(0x2, 0x8000000020000001, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000001c0)=ANY=[], 0x1e2) 07:19:27 executing program 3: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$sock_int(r0, 0xffff, 0x1002, 0x0, 0x0) 07:19:27 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x53, &(0x7f0000000400)={0x0, {{0x10, 0x2}}, {{0x10, 0x2}}}, 0x114) 07:19:27 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000002c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000040)="0e", 0x1}], 0x1, &(0x7f0000000100)=[@init={0x14, 0x84, 0x1, {0x0, 0x8, 0x24, 0x4e}}, @init={0x14, 0x84, 0x1, {0x5, 0xfff, 0x5}}], 0x28}, 0x0) 07:19:27 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000100)="95", 0x1}], 0x1}, 0x0) 07:19:27 executing program 4: connect$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0xa}, 0xa) 07:19:27 executing program 5: socket$inet6(0x1c, 0x3, 0x1) 07:19:30 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:30 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000001240), 0x0, 0x40000001, 0x0) syz_mount_image$ext4(&(0x7f00000013c0)='ext3\x00', &(0x7f0000001400)='./file1\x00', 0x2, 0x2, &(0x7f0000001600)=[{&(0x7f0000001440), 0x0, 0xfffffffffffffffb}, {0x0, 0x0, 0x101}], 0x0, &(0x7f0000001680)={[{@lazytime='lazytime'}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise_type='appraise_type=imasig'}]}) 07:19:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r0, &(0x7f0000005300)={0x0, 0x0, &(0x7f00000052c0)={0x0}}, 0x0) write$eventfd(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000005680)='nl80211\x00', r0) 07:19:30 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001240)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000000100)=""/104, 0x68}, {&(0x7f0000000180)=""/4096, 0x1000}], 0x2, &(0x7f00000011c0)=""/96, 0x60}, 0x1}], 0x1, 0x40000001, &(0x7f0000001280)={0x0, 0x989680}) renameat(0xffffffffffffff9c, &(0x7f00000012c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001300)='./file0\x00') syz_mount_image$ext4(&(0x7f00000013c0)='ext3\x00', &(0x7f0000001400)='./file1\x00', 0x2, 0x3, &(0x7f0000001600)=[{&(0x7f0000001440)="4b0cbb2775ca2afec879b7735d9949c268102971539ffad87f0b2f59368ca09971ab956ca1b07d74c8aa01a8d4b376f518f88693c2f2d5632ef43119451b3cecf97222c25570febc6e6608326223ef069ad9f73b5601bf72a4ec7d49e5dea87c89b86dd0afc10ab6fa20496a8e4da1e3539141e42d7a832a2a43e1d7b72934f902b422fc2d", 0x85, 0xfffffffffffffffb}, {&(0x7f0000001500)="3653a5826d801ead88b83c2e7fa8b67533667222a56d9a695f13cb4a7310348a43ac47925cc076f55cf261fd68902f423898042a231195eb7518f0801b92ea7f304762bdf3a881bc00a7b81ac03949c0774ab458b1c51cac5be251a876516cdef477b1618f4e41f017dadace1a1464a04053ba48dc05e42332cc4fe21bd7caf365998dfa", 0x84, 0x37c}, {&(0x7f00000015c0)="374b44b47337f5621bc89e3ff55066fe9ec03ba68e3486549fd0be73458ca43b73c72cbb", 0x24, 0x101}], 0x4002, &(0x7f0000001680)={[{@lazytime='lazytime'}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise_type='appraise_type=imasig'}]}) accept$unix(0xffffffffffffffff, &(0x7f0000001700), &(0x7f0000001780)=0x6e) syz_genetlink_get_family_id$wireguard(&(0x7f0000001880)='wireguard\x00', 0xffffffffffffffff) 07:19:30 executing program 3: syz_open_dev$dri(&(0x7f0000001980)='/dev/dri/card#\x00', 0x0, 0x0) 07:19:30 executing program 5: renameat(0xffffffffffffff9c, &(0x7f00000012c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001300)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000001400)='./file1\x00', 0x0, 0x3, &(0x7f0000001600)=[{&(0x7f0000001440)="4b0cbb2775ca2afec879b7735d9949c268102971539ffad87f0b2f59368ca09971ab956ca1b07d74c8aa01a8d4b376f518f88693c2f2d5632ef43119451b3cecf97222c25570febc6e6608326223ef069ad9f73b5601bf72a4ec7d49e5dea87c89b86dd0afc10ab6fa20496a8e4da1e3539141e42d7a832a2a43e1d7b72934f902b422fc2d7b18064c", 0x89, 0xfffffffffffffffb}, {&(0x7f0000001500)="3653a5826d801ead88b83c2e7fa8b67533667222a56d9a695f13cb4a7310348a43ac47925cc076f55cf261fd68902f423898042a231195eb7518f0801b92ea7f304762bdf3a881bc00a7b81ac03949c0774ab458b1c51cac5be251a876516cdef477b1618f4e41f017dadace1a1464a04053ba48dc05e42332cc4fe21bd7caf365998dfa68020f9a2efe32ed9609a43171f1f45800883f651941672e78a8258d33f30a2e0e", 0xa5, 0x37c}, {&(0x7f00000015c0)="374b44b47337f5621bc89e3ff55066fe", 0x10, 0x101}], 0x0, &(0x7f0000001680)) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000001f80)={&(0x7f0000001ec0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000030}, 0x4000) [ 778.947380][T22025] loop5: detected capacity change from 0 to 16383 [ 778.979478][T22028] loop1: detected capacity change from 0 to 16383 07:19:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000009b80)='nl80211\x00', r0) [ 779.005825][T22033] loop0: detected capacity change from 0 to 16383 [ 779.006746][T22028] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 779.025103][T22033] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 07:19:30 executing program 3: pselect6(0x40, &(0x7f0000000000)={0x1}, 0x0, &(0x7f0000000100)={0x2}, &(0x7f0000000140)={0x77359400}, 0x0) 07:19:30 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, 0x0) 07:19:30 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000040)={0x1, 0x0, 0x13, 0x0, 0x0, &(0x7f0000000180)}) [ 779.132257][T22042] loop1: detected capacity change from 0 to 16383 [ 779.155197][T22042] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 07:19:30 executing program 4: pselect6(0x40, &(0x7f0000000140), 0x0, &(0x7f00000001c0)={0x3f}, &(0x7f0000000200)={0x77359400}, 0x0) 07:19:30 executing program 1: msgrcv(0x0, &(0x7f00000000c0)={0x0, ""/105}, 0xfffffffffffffe53, 0x0, 0x0) 07:19:33 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000580)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000540)={0x0}}, 0x0) 07:19:33 executing program 5: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x840, 0x0) 07:19:33 executing program 0: modify_ldt$write(0x1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}, 0x10) 07:19:33 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uhid\x00', 0x1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="0e"], 0xaa) 07:19:33 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "bdb51e436beb1068995a884a6238deea198b66"}) 07:19:33 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x2, 0x0) write$vga_arbiter(r0, &(0x7f0000000180)=@target_default='target default\x00', 0xf) 07:19:33 executing program 3: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ttynull\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x5407, 0x0) 07:19:33 executing program 4: clock_gettime(0x0, &(0x7f0000000100)) mremap(&(0x7f0000c50000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffa000/0x1000)=nil) mremap(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000c4d000/0x2000)=nil) 07:19:33 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x24c, 0x14, 0x1}, 0x40) 07:19:33 executing program 5: mmap$IORING_OFF_CQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x8031, 0xffffffffffffffff, 0x8000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x8032, 0xffffffffffffffff, 0x8000000) 07:19:33 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000c4d000/0x3000)=nil) mremap(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000c4d000/0x3000)=nil) 07:19:36 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:36 executing program 4: mremap(&(0x7f0000c4d000/0x1000)=nil, 0x6000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x8032, 0xffffffffffffffff, 0x8000000) 07:19:36 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) mremap(&(0x7f0000c4d000/0x1000)=nil, 0x6000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) mremap(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000c4d000/0x2000)=nil) 07:19:36 executing program 0: mremap(&(0x7f0000c4d000/0x1000)=nil, 0x6000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x8032, 0xffffffffffffffff, 0x8000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x3000, 0x0, 0x8032, 0xffffffffffffffff, 0x8000000) 07:19:36 executing program 3: timerfd_create(0x5, 0x80800) 07:19:36 executing program 5: mmap$IORING_OFF_CQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x8032, 0xffffffffffffffff, 0x8000000) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000c4c000/0x2000)=nil) 07:19:36 executing program 0: mremap(&(0x7f0000c4d000/0x1000)=nil, 0x6000, 0x1b3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) 07:19:36 executing program 4: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x1e4e0000, 0x0, 0xa032, 0xffffffffffffffff, 0x8000000) 07:19:36 executing program 3: mremap(&(0x7f0000c4d000/0x1000)=nil, 0x6000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x100010, r0, 0x10000000) 07:19:36 executing program 1: mq_getsetattr(0xffffffffffffffff, &(0x7f0000003540)={0x400}, &(0x7f0000003580)) 07:19:36 executing program 5: pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) fanotify_mark(r0, 0x19, 0x2, 0xffffffffffffffff, 0x0) 07:19:36 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:36 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/uts\x00') r0 = gettid() syz_open_procfs$namespace(r0, &(0x7f00000000c0)='ns/uts\x00') 07:19:36 executing program 1: pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x0) read$FUSE(r0, 0x0, 0x0) 07:19:36 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000002040)='ns/ipc\x00') 07:19:37 executing program 5: r0 = socket$inet(0x2, 0x3, 0x7f) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x64010100}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x1ff}) 07:19:37 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1, @ipv4={[], [], @broadcast}}}) 07:19:37 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x18, 0x4, &(0x7f0000000100)=@framed={{}, [@alu={0x7, 0x0, 0xb, 0x0, 0x0, 0x4}]}, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1003, &(0x7f0000002100)=""/4099, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:19:37 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:19:37 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x6, 0x0, 0x10) 07:19:37 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x8, 0x3, &(0x7f0000000000)=@framed={{0x63, 0x0, 0x0, 0x0, 0x0, 0x6c}}, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000100)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:19:37 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)={[{@nodecompose='nodecompose'}, {@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 07:19:37 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x17, 0x0, 0x0, 0x2}, 0x40) [ 785.946924][T22164] hfsplus: invalid uid specified [ 785.988999][T22164] hfsplus: unable to parse mount options 07:19:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:39 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001280)='/dev/full\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) 07:19:39 executing program 1: unshare(0x48000600) r0 = inotify_init() inotify_rm_watch(r0, 0x0) 07:19:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x2c}, 0x1, 0x0, 0x2100}, 0x0) 07:19:39 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x7, 0x4, 0x10, 0x2}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x20) 07:19:39 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@exit]}, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000100)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:19:40 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001280)='/dev/full\x00', 0x0, 0x0) read$rfkill(r0, 0x0, 0x0) 07:19:40 executing program 5: getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000001100)) 07:19:40 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x8, 0x3, &(0x7f0000000000)=@framed={{0x63}}, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000100)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:19:40 executing program 3: sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, 0x0, 0x20000000) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300), 0xc, 0x0}, 0xc011) getsockname(0xffffffffffffffff, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x0) syz_btf_id_by_name$bpf_lsm(0x0) 07:19:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x2c}, 0x1, 0x0, 0x1300}, 0x0) 07:19:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7ffffff2}, 0x0) 07:19:43 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0, 0x2c}, 0x1, 0x0, 0x2}, 0x0) 07:19:43 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x34, 0x0, 0x0, 0xffffffff}]}) 07:19:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f00000004c0)={@local, @loopback, @multicast2}, 0xc) 07:19:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:43 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x17, 0x0, 0x5, 0x81, 0x2, 0x1}, 0x40) 07:19:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x90, 0xc, 0xc, 0x2, [@fwd]}}, &(0x7f0000000040)=""/4096, 0x1000000, 0x1000, 0x1}, 0x20) 07:19:43 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000000), 0x4) 07:19:43 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x9, 0x3, 0x2, 0x40, 0x1}, 0x40) 07:19:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f00000053c0)={&(0x7f00000052c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000005380)={&(0x7f0000005300)={0x40, 0x2, 0x7, 0x201, 0x0, 0x0, {}, [@NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8}, @NFACCT_FILTER_MASK={0x8}]}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x4}]}, 0x40}}, 0x40000) 07:19:43 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8918, 0x0) 07:19:43 executing program 1: ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9208, 0x0) 07:19:43 executing program 0: syz_io_uring_setup(0x6726, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0x4000)=nil, &(0x7f0000000100), 0x0) syz_io_uring_setup(0x727e, &(0x7f0000000280), &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff9000/0x7000)=nil, 0x0, 0x0) syz_io_uring_setup(0x37e3, &(0x7f0000000180), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff6000/0x4000)=nil, &(0x7f0000000200), &(0x7f0000000240)) 07:19:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r0, 0xffffffffffffffff) 07:19:43 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000240), 0x8) 07:19:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:46 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0xff5f) sendmsg(r1, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103, 0x6}, 0x60, &(0x7f0000000140)=[{&(0x7f00000027c0)="11842700900608233e496d5671dc71ff04291b2c1501772502bb867063f70647862a15257781bcf1d1e498104d082833914ee68afc14ac7cb85975751b8c31271948ee303aa2a34be964b8c1b95638607b2e7ec7fda28fea4caada028a39bf259538214e80b9b5c9b58b1cb36a933d64a25324566f7733ea93fc91c98fec268cb1e2148198e2ccf2463d2ae56c61ac436c336b2d421c6b512a600955c6ede3e5820165eabf2dda9e2294300485327a6d28f7913f19d79e5f478626bb6a607c2f5085c68749edc417da6cc4db8c605215575067836f62b0b3e0b49e8c321240c1b1b54babad07a7000c4eb99200b9d016f1554683b7b3323ab37f066b973d584345792feba5b719ec0413d1c37689ce927de538b4ac16687f6595120220e5205f79227e43a8eaa610c8c232bcb811b4a63eab1b87da214700408e830774dcd6318bec9ef28b9171b0492bddb09009a8d26f797713d81548e0c547b8aa7bcd844c2cfa69560deaa6188b576792cccdc09a1f94da4e4c4f05e4d053d6a2fcdb253dce696d6cd85a1aee740c2a84e3d63aa558d3db42531e2303c6e8cfc0b6e31950fcbf3021f708d47c05edcf3fcdd66226d99f1f132d73f698e0820c395f343e0d69042b6b06bf40b45ea6a8f52a32255f3c40d4e9fb93084421a6235116be29125e5afe2d8c418cedb2548db2fcade80c118af8a6be1e650517519721a5920f842662aad37473f2ba60f7ee8466f8dba829c3e17d3e618ef5768b1b0a8991c64f2e592e726bb4636d13fbd04ed71b031e1c1a27fe30325e521a9845ef1abae620cefb216c47a1e3b4db8cb1287006b9fed827fa5a944b8045a3397ba4208c5cb67117393b2f836e4e79196e05ebd7488fa76619ea0521982b9cb76a63bed4f0ffe48ceb4b2bbe4e590dec80eca4740027f855dad06313a2a0188932a2069fc70b8af0e4294a7b51b552ad72ccd5625fd2a971354bad2930eec5f41e0ae271224b8a9160d96965d372c65e4a0adcee1e8bb84406b6a5c5e4d6ed7ff529afdffcdbea58f43e7c39f8aa9845fc92c84aa8bc0eef238d19b2cd3dd0c6d52694c99f2f493b7064076b62d139837eda3d11e43ae52fb771c1585974bcc6e2adb24096fd3d5ac867afb9cfb6ed07cb34e227f00ed5541499d2e7e3b4f3da831a3b9c32de8be0f5b45e8248b5a2811bb452ca6dc7d56d87531347ad316e6e8c6bf887f70f455cdeae8dcfff004b0ed1b8fd63d1d5e55cbdf1541b87821f3c90f7d47e542ec75b132f5285862d3e9fd84f841e4d137e2735d5f23c87108bcaa591a14ab2ab43802ffb176453312420fe0e79af7236850104bc3e925b16fd0a57ee9959ae8ccc13c843365442bb462d86ead8a20c41e064e0ad286f4aa4c69d0046e5012cecf425b0df11c0b458e31804d8ffe98554afc69b475ca03cbe926806b276e19aa47b3e101b95ee2fd32b9f06a3fcf6f078ce694f9ed8fe03425446bcdd0e7c1f4d3e109bbe30020cb81b64bb0cdfd8a0d33e1143c4fbb7fef15d1059e1f20b394f69d482a1da5fd49508808c80c824a843698386b4d3c3885f063aa3c047624f93298040fbc706020d295cf3f363d42f21d327d91d101cc4758c67195a49c3b3002e14cf28a5b8899b7ef08b6713d89c7049ef594361b1d8a0c5838ff30a6a3f1b0f9f947c76d5f1629d3df215975b498bd33ddbc44798a9f76ba0c41e9ad565e44ebf3c333fade1d4306b1042c5e2e855f3e5fdcd64ce7fdf73b09044bec8a2f0cecbb00c6c76c85891478aa4bae6282541cff613f2b461cce115ba0b78c6f50f4593efe5c2ae558f6c0534db14d5b44416b08abe45c6ddf5c749aae8141e427a0a2f42b903ac71caa09e5098cc2c07d79145c7408415d8f937108d6becdbb38a2b3250c0fdf36297375aa3212c9bc8483e8d629c54a79ca55cdda720496753f27fd9e88e203594c1e28514e0d22b9c34c3e1f10253217abed40b09a533fad16c7b9b8e89d7dfd3b27d579bfc813ad2895543ada10f886c7c75010bc70345b727513fa3b7c6aa677a22e037e2bd7731148996f3a8c424075fd12aa8eb9d8f6a8fe7b2eb68934799f5063c58c1816caa4b400bb0914fc7300111c063e5c01910b0b01803a1a348f387542236d82bef6d926ba571ca0e7745e586eddf2334baeafd7b1149502e781ec45299c3f3cd34c3628057def3c012878123224e33828b216022dfebdc6a284e503868a1e4369af819fcfd4124d801386dbb123ce88d54712f6351c77aad6039b2f5ff3d0d1903c74043864fa9f801847ac8446280a31739e0215bce77c08c2477e9079f62225cf179da445e9f220560d995238f17e87dd4ce0f7ebe5f8941d5d130c2d6398e08bb893b5dd8e58701e41e75fd0182d3ebac8920aad7f4777b4e096eb5c5a17e440c0a5b95ca92bbaec63130bbc41d0cbfccb03eb6c1cffc8558bd255c2096a285346dd9600f33554acf62aef19d2776bd5d8a5a9f0a4976022b8ac1400e3f0a7fa227ebc0ad80187939562492154c708739f865a9803512a6213d5026b1febd0a20ce4b3a4d7d90dc5af3f5beaa06b8af1d19556655ac578f9266f5d3b393f24a2d112eee90f749e1f0a6e27ff2469f1cc21d5bcbf355168c62044fd1cc4861544a8175f640ad3c5bb6c81efa331822efb70b57f4110deebe68794211ee4a95c259b4eb519d887b6cfdee178758382f4f63c80b1f0b9f2337dd5a11a5b1fb04c3315ff942cf7f5d7da36c088a65f86529d003c8c9bf74392f9d897b53a422cb3b3f9e09f9936514ac100fecf3c9a573aae041ce3c86cce6dc2884053bc56a510791392bda454aa7dc580a3a7cf71c18dd57bec21c0eb143deb654d8b0fc642bbc7484dc9943c2102169a6aca278f0fd81b1b6b082b355443c8198284e3b01e9fff1c8df1895e9c9593f16438c7f737f2ab56c0f57eadfcd570c5b04b5218fc7d2c0cdca5c7ba5ff428b4fe541d4c8f6fe274d2a3290343f3d6944c918571e350caf2ec3cc9601cd5b71e8f22ff401024c51c592bf476f255b200962e2ed014ce551376235e8d220763f8c9c904570d6b6227c94d62e08b0c9bd3557b96c8ed227685fc54d43e4a05ca5996c4d8e3e5076f394b0c0bc7cdf972f996c45987ffb2d6a138a1772b7ffbeaa66ceddd34839051c61f9d87153f23823f9178b56eb016524ba862cdca9d147b5bda79553ade825d5a1b8ea3acf8c7cad88cd11b68625d367931b9a0296b228fd2c52da32d050d746942fb38dbb3d5e2ad75b7243f7340a8c0d4c7b156e030b6eb154ec6c47c1b6af307ea0e8916e21166572632321f8b4978ecd1f8b4029a6baba4da2dd984d245d1b6dd4a6f2a72acc4d90f480de489826130dd7b2a9ad79938ed6de65c7a56e0515d84302a8a8ee98c20ea32db20b231b9d00e03dd74b804e15c70ce8a6b169ffa79db7e24062b2dd3560502337bb03c8506a25ce77eaa06f9fb54aff0bab9545c32bb9a35a700361f46a3995ef929af7698bf16df9d8965f4d939f5dba6eb238c1089c25617568b29760ecbfef273b8070c3853a652d30da91cb00e0afa1c663589158711984cfe38869974c30e9b51333091cb0f5d72f5ddb0f3bc550b2787ff6fdfe0b90764f8ec319a2674d6e16ca2417b7a2144b5a4ad248fc4b2b8f74ed1957bd4f52f0db0ac4eb8f6dc62c51e16a803bff507359abdbd0ce1ee0fb936a4a060954c1a939b4b197b61311d079ef09e57e60f94fd796c12cf7e62e11bbdc11e04fc79736e42d6d2dcb02e705dc4e8e17addcc0902af4ebbf0a2f57db53cbe99bb0797137c903195de282ed02c37634181936e351f383fb590eb453e539b80c6935185ac40890c1ba70b5e2eb53235f3a983ce4608929d2609354f89fc22f80a0aa9fc0ea9af7f06e46d8b5f5d47dbd2efe1f2d0f4edee09f11b57c257ff5ecfe96ada3c5f37e1d766c5c85490d14f297e1ce65ae34909f04492e7cc955faabb205491a096147d0930ffa70b68055523e360328f26f28ff160cdb8b4785a22110191c9ecfd187267c1a4300e9370a41c73fe224f3a9c54493780b1a4ff96398f0a60f66e48ef4ad7183f71c0c4d6d9d1a57e19a56d9ed426cd4143de82ceb33011988ed079b52ab30300255e066a84959a10676c7b58515ff9bed194c784072af1062734f5d497f2be9b0ea1228f5a981e8d5d78da49da90b040d4e3a93b7f71360b25cf75fca36a4068748e1bc171dd40fa31d6f9c4c926a635f4ea4faf7511146bc5782606966aaab13a30d67cf182751149f678852da30d0f9b6ea5524a1f5ea01e77d7a74ac588ab2251cdbc9f4f8aa2cf367f0ad2178e66fbd7ab447aae12a7bc6cf3925fe99dcdf8ec95cf4576520b781dc12fe6d310978315d2e3d7dbc49c9be2fa40788ebd5fc02c6c7f566a64b7f4af7a96353265dc9e4c74c909b9a385966f4d7312fdcdfa8f5d0632c6db4a19ce696416a04e937d4a994e757eae59c07e5d3228254b35003eba32ed448516e9aa77b5b92c9ce7fff06a8f4f652d27971a46c621a6b2ee3c1adaf60d5cdfb381a4e4ac9ab7d7d72fcb2d6aa7e104255345f1e15dec8299c9c75735a01338d20f72d8b359803becef76d9ca6da029d0a795e6d4a652bf3880efeee074c81774b2971da03eff6d9516ac8a0c34b686aa1afbcb2befc79618a3dbb2bcd53da0075cdba0ddd975fd4e833291005f0fbf7b167922dc85b109e1381431e0fdc50f80b8592edd57f50f9dd950205e1a21cd3026cb30abe6d06dbec6c7cdb76d90c0e85a69aa1522281bcb3f4fc54ee443e76c7d9bf82e313f2dc3e277c699e079a847635780a5b724aca0ede72febba648de12fd14e3a78b29e9df82a19f4ed9c712e5b313c05e6908f6d4601d076afda5cf77eab4ea7c44c9d40f463fe8cde79f18170de9b087b113cfc7d467bd164564c2a8a99e4566d6f9eb1a8d5393700158fe84c109735cfe0ab45d9eb6fe61619d8538512730e015ffac07279973126e9087b209144c8797dd6b65381e616256a9cbf7771222c41618eb82d3539e7750ef0614acb4c901f88f31589d9d6d87c4b2a5361ad44155bf5476f2bc42cd2e758d478a1bcaf27c6c5607f025c8ff75913cb95eb631a690e3e6201204e616a4482a6eae323dadc0a9c22a7de1567ec3f45380bbde304cc76efd4bb0ac9f28475534eb973fc02f3f5dc73a862052f82f6d40c0821012589925ce3f2274ff2a8097b8464b44068c1505b967679bcc6b5d7e7ece9bd1880fc32531fe5d7bac9c5262a709239e477ecf44915a70aa7f984ec1bed047f3ec92a55714403c7c7503a3ac87cec792e072eefa623c56b6b33beb5ae7f5066a952cf6b0b25ab74841e5d2a9b20b1fe0cd83c3aae37eac0dd08d6a65410af956767766f2c6c12d13e87f363052e1e645c2dccd42948be835a9fe1c8892453b73cbcaa7c9222ccece11f86fba52d29d64a609da597e226e5f59e9a8301297c1e9881557a860df15ee14cf4bf70988e2cf90359587bc378adba5aa610db3cc1d6ae5fba9390b4c", 0x5}, {&(0x7f0000000840)='\x00', 0xc9ed}], 0x2, 0x0, 0x0, 0x1a0}, 0x80) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r2, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 07:19:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r0, r0) 07:19:46 executing program 0: read$eventfd(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="440000002100010029bd7000fbdbdf250a"], 0x44}}, 0x0) 07:19:46 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f00000018c0), 0x0, 0x0) 07:19:46 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000001400)='/dev/nvram\x00', 0x0, 0x0) ioctl$sock_SIOCADDRT(r1, 0x890b, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440)='/dev/snapshot\x00', 0xc01, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000001400)='/dev/nvram\x00', 0x0, 0x0) ioctl$HIDIOCGRDESC(r0, 0x90044802, &(0x7f0000000480)=ANY=[@ANYBLOB="81020000abcce44ca515ab1807c3ab2a432307a9e6b6791c55522bbe75d99e08a754fc355724e86f03572089cdbce5c0fa60412f2098cbcc123fc2d0c899632adbbb065e9536108cd71048fa691a1a29826cc5cc107aad5a3b6c98e9c89a6290e146fe83250c93f9c2af1b6136014aaeccbf72b8fbaf4222ea404fbc1e704735fc8ec5cb207ba17300be83a7789efecefc4e5e475bce3cb517bf0bcf02f10cf110bd2f290d36163f9fa59586249979a104b5ba3b91e30789e92c920ccaca1431c60665027623278e14b6fc75e7c3e5a2d9d3a0223e98e9adf902bb1b50d18654e952df267138e23012c5c02b62f26be369555975230d28b9732907ab69fcfd3c638d94b6df4a152f63a35c39cface3159f2783c385a87cad39510cb975b4eba952288925532f8d2865f41742687dadd597a2fb57e204bb1b60f819df06ea31ba3a19181c8f4af10d8bb6cbcc0fe05aea8475e94c413a9f80ccc48b8d111445b0ec0b7a53323dc30a4359d566dabf669750d3ff083e4b47bf991dbb625cd72279c8663b1cd46998dfcce752c574d577b58b02e72befc0bdebee1c2897929778ea38e7ec12e3fed72f30a5d8077e3583656164bd82deecad622e2d8c4bac1bf21380144688cbac9a9b400f7d5fa49dcc0076944b12d55df65ed3348a7a677c6592f01551bb965ecb3540133fc4e50d9aafe80e12469e4efc7c664f1fdee60419e67fed3aa16f7aed26428f200822d8e5d23b2685a7ca4ca078af7d136c1ed0d63e5412720a169d126590cbcc6c159f86b1bca81228f66e124434b67399a399744bad62ad70580dc34134e65feea032c670319954a4d6a4905578ddae742d42614c143aa195182686459678dd9251bd3f88d4f4b54009ac5a195d6f184a3f78c80eeb4d09572d77d7effa3639ddfddca27fd4c3cf7daf9110435b902f58bd1a9885af6c953fc95671f1be1f3fcfc24e44a441e0efc5ddc50f5e020df16ae21f2e4e8c2313dfc4df6cec78d7dc089e294a764de4a720acbfe26963f73fe813e5ae568543516023b7d605b36e0e7f123adbbc9b8ee8851100938919547e53bdc16467328cf3abb392d0108d9d094c8eb4cb590bf476a006d37eb96a6a5ca30fec66d9886a0b7d5c8ed0edb6e56729d8d52f29c32352752bc8f566fdcac8a68dc62fdd2dad97c0d82277be0dcb49d3bc61ee9dad24c6b825e4573c01def2eda7f7106ddfb0a5"]) [ 794.708531][T22308] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 07:19:46 executing program 5: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="8ea50fef9235346f99a75342fdfbaf9bffbea899a722d740a3e6ba21154e921d", 0x20, 0xfffffffffffffffc) 07:19:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000005280)={0x0, 0x0, &(0x7f0000005240)={&(0x7f0000005180)={0x20, 0x15, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) [ 794.796722][T22315] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 07:19:46 executing program 0: r0 = socket(0x11, 0xa, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, 0x0, 0x0) 07:19:46 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x21, 0x0, 0x0) 07:19:46 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f0000000080)={0x0, "cb2e724fa23e557801647fdfecb444803dc2a00154ecafa58d51fc62029ea49ba6569dc9a4cbb1eda16d5f4a481a892307e3a9ac3f77add064a8df3ce70782c3"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x2, r0, 0x0, 0x0) 07:19:46 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xc, 0x0, 0x0) 07:19:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:49 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000180)={0x0}) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f00000003c0)) 07:19:49 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000001300)={0x18, 0x0, {0x3, @multicast, 'bridge_slave_1\x00'}}, 0x1e) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000001300)={0x18, 0x0, {0x3, @multicast, 'bridge_slave_1\x00'}}, 0x1e) connect$pppoe(r1, &(0x7f0000000100)={0x18, 0x0, {0x0, @empty, 'veth1_virt_wifi\x00'}}, 0x1e) 07:19:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv4_delroute={0x24, 0x19, 0x1, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6}]}, 0x24}}, 0x0) 07:19:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @loopback}, @ipx={0x4, 0x0, 0x0, "422a0519bf84"}, @ax25={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0xe7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='nr0\x00'}) 07:19:49 executing program 1: mbind(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x2, &(0x7f0000000000)=0x36b5, 0x5, 0x0) 07:19:49 executing program 5: mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000003000/0x2000)=nil) 07:19:49 executing program 1: futex(&(0x7f0000000000), 0x80, 0x0, 0x0, 0x0, 0x0) 07:19:49 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x56, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x44, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}, {[{{0x9, 0x5, 0x81, 0x3, 0x30}}], {{0x9, 0x5, 0x82, 0x2, 0x3ff}}}}}]}}]}}, 0x0) 07:19:49 executing program 0: syz_open_dev$dri(&(0x7f00000006c0)='/dev/dri/card#\x00', 0xffffffffffffffff, 0x20040) 07:19:49 executing program 5: syz_usb_connect$cdc_ecm(0x0, 0x56, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x44, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}, {[{}], {{0x9, 0x5, 0x82, 0x2, 0x3ff}}}}}]}}]}}, 0x0) 07:19:49 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x22301, 0x0) write$6lowpan_enable(r0, 0x0, 0x0) [ 798.309285][ T9739] usb 5-1: new high-speed USB device number 2 using dummy_hcd [ 798.399030][T22250] usb 6-1: new high-speed USB device number 93 using dummy_hcd [ 798.558966][ T9739] usb 5-1: Using ep0 maxpacket: 8 [ 798.648974][T22250] usb 6-1: Using ep0 maxpacket: 8 [ 798.679216][ T9739] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 798.691837][ T9739] usb 5-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 1023 [ 798.711728][ T9739] usb 5-1: config 1 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 2 [ 798.769137][T22250] usb 6-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 798.780402][T22250] usb 6-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 798.792113][T22250] usb 6-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 1023 [ 798.803498][T22250] usb 6-1: config 1 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 2 [ 798.879807][ T9739] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 798.901281][ T9739] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 798.909564][ T9739] usb 5-1: Product: syz [ 798.914735][ T9739] usb 5-1: Manufacturer: syz [ 798.920093][ T9739] usb 5-1: SerialNumber: syz [ 798.951103][T22362] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 798.979589][T22250] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 798.991980][ T9739] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 799.000766][T22250] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 799.015735][T22250] usb 6-1: Product: syz [ 799.021300][T22250] usb 6-1: Manufacturer: syz [ 799.025939][T22250] usb 6-1: SerialNumber: syz [ 799.050963][T22371] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 799.070217][T22250] cdc_ether: probe of 6-1:1.0 failed with error -22 [ 799.195189][ T9739] usb 5-1: USB disconnect, device number 2 [ 799.286918][ T8] usb 6-1: USB disconnect, device number 93 [ 799.969661][T22382] usb 5-1: new high-speed USB device number 3 using dummy_hcd [ 800.058884][ T8] usb 6-1: new high-speed USB device number 94 using dummy_hcd [ 800.208919][T22382] usb 5-1: Using ep0 maxpacket: 8 [ 800.299007][ T8] usb 6-1: Using ep0 maxpacket: 8 [ 800.329032][T22382] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 800.340827][T22382] usb 5-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 1023 [ 800.352860][T22382] usb 5-1: config 1 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 2 [ 800.419291][ T8] usb 6-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 800.430385][ T8] usb 6-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 800.440637][ T8] usb 6-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 1023 [ 800.451429][ T8] usb 6-1: config 1 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 2 [ 800.519368][T22382] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 800.528466][T22382] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 800.538026][T22382] usb 5-1: Product: syz [ 800.543544][T22382] usb 5-1: Manufacturer: syz [ 800.548189][T22382] usb 5-1: SerialNumber: syz [ 800.572624][T22362] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 800.592584][T22382] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 800.629918][ T8] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 800.640038][ T8] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 800.648139][ T8] usb 6-1: Product: syz [ 800.653532][ T8] usb 6-1: Manufacturer: syz [ 800.658275][ T8] usb 6-1: SerialNumber: syz [ 800.692538][T22371] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 800.730398][ T8] cdc_ether: probe of 6-1:1.0 failed with error -22 [ 800.799285][T10181] usb 5-1: USB disconnect, device number 3 07:19:52 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:52 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000180)={0x0}) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f00000003c0)) 07:19:52 executing program 0: keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000080), &(0x7f0000000100)=ANY=[@ANYBLOB='enc=o'], 0x0, 0x0) 07:19:52 executing program 1: add_key$keyring(&(0x7f0000000380)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f00000003c0)='$\x00', 0x2) 07:19:52 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0044306, &(0x7f0000000000)=0x20) 07:19:52 executing program 0: futex(&(0x7f0000000200), 0x8c, 0x1, 0x0, &(0x7f00000002c0), 0x0) [ 800.949451][T11529] usb 6-1: USB disconnect, device number 94 07:19:52 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f0000000000)) 07:19:52 executing program 1: fork() syz_io_uring_setup(0x2680, &(0x7f0000000100), &(0x7f0000004000/0x2000)=nil, &(0x7f0000000000/0x11000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 07:19:52 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000180)={0x0}) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f00000003c0)) 07:19:52 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x190, 0x30, 0x0, 0x0, 0x0, 0x0, 0x4}) ioctl$SNAPSHOT_ATOMIC_RESTORE(0xffffffffffffffff, 0x3304) read$fb(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCSUSAGE(0xffffffffffffffff, 0x4018480c, 0x0) ioctl$FBIOGETCMAP(r0, 0x4604, &(0x7f00000001c0)={0x0, 0x1, &(0x7f00000000c0)=[0x0], &(0x7f0000000100), &(0x7f0000000140), 0x0}) 07:19:52 executing program 0: syz_open_dev$evdev(&(0x7f0000000480)='/dev/input/event#\x00', 0x0, 0x0) 07:19:52 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000180)={0x0}) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f00000003c0)) 07:19:55 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:55 executing program 5: timer_create(0x0, 0x0, &(0x7f0000002380)) 07:19:55 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000880)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0, &(0x7f0000000d00)={0x77359400}) 07:19:55 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x10}, 0x10}}, 0x0) 07:19:55 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x190, 0x30, 0x0, 0x0, 0x0, 0x0, 0x4}) ioctl$SNAPSHOT_ATOMIC_RESTORE(0xffffffffffffffff, 0x3304) read$fb(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCSUSAGE(0xffffffffffffffff, 0x4018480c, 0x0) ioctl$FBIOGETCMAP(r0, 0x4604, &(0x7f00000001c0)={0x0, 0x1, &(0x7f00000000c0)=[0x0], &(0x7f0000000100), &(0x7f0000000140), 0x0}) 07:19:55 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x6000d303, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:19:55 executing program 0: timer_create(0x0, &(0x7f00000001c0)={0x0, 0xd, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)) 07:19:55 executing program 5: socket$inet(0x2, 0x0, 0x3f) 07:19:55 executing program 4: openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsu\x00', 0x0, 0x0) 07:19:55 executing program 0: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), 0x0, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140), 0x8}) 07:19:55 executing program 0: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), 0x0, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={[0x5]}, 0x8}) 07:19:55 executing program 4: syz_mount_image$msdos(&(0x7f00000005c0)='msdos\x00', 0x0, 0x400, 0x3, &(0x7f0000000800)=[{&(0x7f0000000640)="8a1aa094fb3fd043757f9e42ad3901827631eaf8aabe459a62ee78802545f3", 0x1f, 0x7}, {&(0x7f0000000680)="db0e11a6aac4e2c1831968f1a632c1a6e5500258d42b131cba789ec4f5a50bd155f6c0ea67f8c2825362020f29fac6bac1e8c60cab50b25609411d4347400fd57bfc381f39698bc05530a3e28d8f6e0adb75fee5a347376208b5d0c1216eaf548019ce08214a58381bd2f6286a902d33213b023dd95983423ced8d3aed5ed9208c1685e374555291f1b044bde0422f10aa89c478c00773ecc768037b1a5d7d15e54679eabd1517bf761f87c376d88bfc12260ba6a03c5eb28d85f563ef7a78f26d8324fd47f312e42bb8dd20180e5847aa3cdf0812e71df496bd74b7332d4f07cf8245", 0xe3, 0x10000}, {&(0x7f0000000780)="08228c109dcd252f316b69ff9b7fa2e092b3321d9fe0e336592348ff9ddd3e622286072e58540fefed0e05b28768e95445627722ee47d5b7e21c2ea0cd778da230d7217f1917feaa63f2b09fbd", 0x4d}], 0x10040, 0x0) [ 804.586434][T22545] loop4: detected capacity change from 0 to 256 [ 804.688675][T22545] loop4: detected capacity change from 0 to 256 07:19:58 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:19:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000000)='gtp\x00', r0) 07:19:58 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm_plock\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) 07:19:58 executing program 1: syz_io_uring_setup(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, [0x0, 0x2]}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000800000/0x800000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) 07:19:58 executing program 4: clock_gettime(0x0, &(0x7f0000000700)={0x0, 0x0}) select(0x40, &(0x7f0000000640)={0x1}, &(0x7f0000000680), 0x0, &(0x7f0000000740)={r0, r1/1000+10000}) 07:19:58 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x8, &(0x7f0000000080)=@framed={{}, [@exit, @jmp, @ldst, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:19:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x0, 0x400}, 0x1c) 07:19:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000003c0)=@gcm_256={{}, "2f69b1e8006d2981", "01ebf430dd0454bb240d92caeb88506c21d641d5c7a32f9252efcc861359afd9", "d254b403", "8fbdb45c33355036"}, 0x38) 07:19:58 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x12, &(0x7f0000001740)={0x1}, 0x1) 07:19:58 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000001780)=@in={0x10, 0x2}, 0x10) 07:19:58 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r0, &(0x7f0000000140)="ab", 0x1, 0x0, &(0x7f0000000240)={0x10, 0x2}, 0x10) 07:19:59 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) [ 808.501059][ T3251] ieee802154 phy0 wpan0: encryption failed: -22 [ 808.508888][ T3251] ieee802154 phy1 wpan1: encryption failed: -22 07:20:01 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0xb) 07:20:01 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000007c0)={&(0x7f00000003c0)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c, &(0x7f0000000040)=[{&(0x7f0000000100)="13", 0x1}], 0x1, &(0x7f0000000340)=[@init={0x14}], 0x14}, 0x0) 07:20:01 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:20:01 executing program 3: socketpair(0x2c, 0x0, 0x0, &(0x7f0000001840)) 07:20:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x1e, 0x4) bind$netlink(r0, &(0x7f0000000000), 0xc) 07:20:01 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg(r0, &(0x7f0000007180)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20004001) 07:20:01 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x890d, 0x0) 07:20:01 executing program 0: pipe(&(0x7f0000005ec0)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 07:20:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000000)=0x1, 0x4) syz_genetlink_get_family_id$mptcp(&(0x7f0000000040)='mptcp_pm\x00', r0) 07:20:01 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/time\x00') 07:20:01 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 07:20:02 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSACCEPT(r0, 0x8903) [ 810.540219][T22633] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 07:20:02 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000080)={0x20, 0x140c, 0xffff, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}]}, 0x20}}, 0x0) 07:20:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, 0x0) [ 810.604403][T22636] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 07:20:04 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:20:04 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x400448e4, &(0x7f00000000c0)={0x0, 0x0, "0c1a67"}) 07:20:04 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f00000006c0)='nl802154\x00', 0xffffffffffffffff) pipe(&(0x7f00000007c0)) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) socket$inet_icmp(0x2, 0x2, 0x1) socket$nl_generic(0x10, 0x3, 0x10) 07:20:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x1, 0x4, 0x201, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x2}]}, 0x1c}}, 0x0) 07:20:04 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x400448ca, &(0x7f00000000c0)={0x0, 0x0, "0c1a67"}) 07:20:04 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x8902, &(0x7f00000000c0)={0x2, 0x0, "0c1a67"}) 07:20:05 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, 0x0, 0xb, 0x201, 0x0, 0x0, {}, [@NFTA_COMPAT_NAME={0x8, 0x1, ')\xcd^\x00'}]}, 0x1c}}, 0x0) 07:20:05 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x89a1, &(0x7f00000000c0)={0x0, 0x0, "0c1a67"}) 07:20:05 executing program 3: sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) 07:20:05 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) pidfd_send_signal(r0, 0x0, 0x0, 0x0) 07:20:05 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:20:05 executing program 5: syz_open_dev$binderN(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0) 07:20:05 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:20:05 executing program 1: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x109502, 0x0) 07:20:05 executing program 5: prctl$PR_GET_THP_DISABLE(0x2c) 07:20:05 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x2}, 0x0, &(0x7f00000000c0)={0x4}, &(0x7f0000000140)={0x0, 0x989680}, 0x0) 07:20:05 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000001940)) 07:20:05 executing program 3: futex(0x0, 0x8c, 0x0, 0x0, &(0x7f0000000100), 0x0) 07:20:05 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:20:05 executing program 4: execveat(0xffffffffffffffff, &(0x7f0000007240)='./file0\x00', 0x0, 0x0, 0x800) 07:20:05 executing program 5: pselect6(0x40, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000180), 0x0) 07:20:05 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x8004552d, 0x0) 07:20:05 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x0, {0x0, 0x0, 0x400}}) 07:20:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000063c0)={0x0, 0x0, &(0x7f0000006380)={0x0, 0x92c}}, 0x0) 07:20:05 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:20:05 executing program 1: pselect6(0x0, 0xfffffffffffffffc, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}, 0x0) 07:20:05 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:20:05 executing program 4: futex(&(0x7f0000000000), 0x5, 0x0, 0x0, &(0x7f0000000100), 0x1f000000) 07:20:05 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000001600)={0xa0, 0x0, &(0x7f0000000540)=[@acquire_done, @exit_looper, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000600)="d8"}) 07:20:05 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) 07:20:05 executing program 0: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000100)=""/188) 07:20:05 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:20:06 executing program 1: futex(&(0x7f0000000000), 0x8b, 0x2, &(0x7f0000001400), 0x0, 0x0) 07:20:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000180)=@bridge_getlink={0x28, 0x12, 0x111, 0x0, 0x0, {}, [@IFLA_EXT_MASK={0x8, 0x1d, 0x1}]}, 0x28}}, 0x0) 07:20:06 executing program 3: fchownat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xee01, 0x1000) 07:20:06 executing program 0: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000100)=""/188) 07:20:06 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/ipc\x00') setns(r0, 0x8000000) 07:20:06 executing program 1: r0 = openat$full(0xffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000064c0)={0x2020}, 0xffffffffffffff11) 07:20:06 executing program 4: openat$cgroup_root(0xffffff9c, &(0x7f00000006c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) 07:20:06 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000000540)) 07:20:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@ipv4_newroute={0x1c, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x5}}, 0x1c}}, 0x0) 07:20:06 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000002600)='net/packet\x00') read$FUSE(r0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_get$uid(0x3, r2) clone(0x200000000204a100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffff}, 0x200002000440eb, 0x2000040187f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 07:20:06 executing program 1: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="040403fac90000000000f76801040000ff8330a2118b6a979d0000000845a90f3d098770298fb1d9df32c38b518c5217cd21e109000002000000005b7189c3003b2c170000710e13"], 0x48) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)) r1 = syz_open_pts(r0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = dup2(r1, r2) ioctl$TCXONC(r3, 0x540a, 0x3) 07:20:09 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:20:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@ipv6_getnetconf={0x14, 0x52, 0x1}, 0x14}}, 0x0) 07:20:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000002c0)=ANY=[@ANYBLOB="440000001200658f"], 0x44}}, 0x0) clock_gettime(0x0, &(0x7f0000000600)) recvmmsg(r0, &(0x7f0000002900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000002a00)=""/191, 0xbf}, {&(0x7f0000002ac0)=""/4111, 0x100f}, {&(0x7f0000000540)=""/189, 0xbd}], 0x3}}], 0x2, 0x0, 0x0) 07:20:09 executing program 5: msync(&(0x7f0000fee000/0x11000)=nil, 0x11000, 0x2) 07:20:09 executing program 0: msync(&(0x7f0000fee000/0x11000)=nil, 0x11000, 0x0) 07:20:09 executing program 1: openat$full(0xffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x11c842, 0x0) [ 817.627146][T22777] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. [ 817.653033][T22777] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. 07:20:09 executing program 0: r0 = openat$bsg(0xffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x5d9602, 0x0) write$P9_RREMOVE(r0, &(0x7f0000000000)={0x7}, 0x7) 07:20:09 executing program 5: r0 = openat$bsg(0xffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x458001, 0x0) write$P9_RFLUSH(r0, &(0x7f0000000100)={0x7}, 0x7) write$cgroup_type(r0, &(0x7f0000005540)='threaded\x00', 0x9) write$9p(r0, &(0x7f00000001c0)="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", 0xff1) 07:20:09 executing program 1: msync(&(0x7f0000fee000/0x11000)=nil, 0x11000, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 07:20:09 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/mnt\x00') [ 817.700956][T22782] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. [ 817.733374][T22782] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. [ 817.790820][T22777] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. [ 817.821582][T22777] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. 07:20:09 executing program 5: futimesat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x0) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) 07:20:09 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x0) 07:20:12 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:20:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$unix(r0, &(0x7f0000002880)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='\f'], 0xc}, 0x0) 07:20:12 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000006c0)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) 07:20:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000180)=@bridge_getlink={0x28, 0x12, 0x111, 0x0, 0x0, {}, [@IFLA_EXT_MASK={0x8, 0x1d, 0x3}]}, 0x28}}, 0x0) 07:20:12 executing program 5: futex(&(0x7f0000000000), 0x0, 0x2, &(0x7f0000001400), 0x0, 0x0) 07:20:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@ipv4_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_PREFSRC={0x8, 0x7, @loopback}]}, 0x24}}, 0x0) 07:20:12 executing program 5: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffeef) 07:20:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=@bridge_dellink={0x20, 0x11, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}}, 0x20}}, 0x0) 07:20:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=@ipv4_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}, [@RTA_PRIORITY={0x8, 0x6, 0x7ff}]}, 0x24}}, 0x0) 07:20:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=@mpls_getroute={0x1c, 0x1a, 0x1}, 0x1c}}, 0x0) 07:20:12 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) getsockname(r0, 0x0, &(0x7f00000000c0)) 07:20:12 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:20:12 executing program 1: mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) 07:20:12 executing program 5: waitid(0x3, 0x0, 0x0, 0x2, 0x0) 07:20:12 executing program 3: mq_open(&(0x7f0000000100)='{s\x01\xc4D\x8dbA\x7f\x90b\xa1\xb8\xfa\xb3\xa2\xe8\xcfW\x83\xed\x8fwx\xe0\xcaL\xe3D1\x12nI\x8bw\xfb\xec\v#>\x1d\xc8\x0f\t;\xcb\x99\xa5\x1e9m\x9e\xb0v\xde\xf1\rR\xb3\xb2\"Z>\xf6\xa1La\x01Eq\xfa\xa1`<\x1d\x9fX\"|\x8aci\x8eB\xc2;^\f\xb7\x87Q\xbc\x02A\tyX\x81<1Iu\xe2\x02z\xbd y\x02\xbbR\x8a\xc6\x9b\xeb\x15)\x8a\xf8K\x9e\xf1\xff\xff=\x9fb\xf89\xcb\xeeH\xa20t-\x16\x0f\xda#\xd1O\xdd\xcbm\x86z\xbc^\xa8\xc6\xa7\xc4\xb1\x7f\xe8\x90\x83\x89\xd0\x129\xfc\xec', 0x0, 0x0, 0x0) 07:20:12 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7f) getsockopt$inet_int(r0, 0x0, 0x17, 0x0, &(0x7f0000000040)) [ 821.108031][T22836] syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET) 07:20:12 executing program 0: fork() r0 = getpgrp(0x0) wait4(r0, 0x0, 0x0, 0x0) 07:20:12 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x101b02, 0x0) 07:20:12 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7f) ioctl$sock_ifreq(r0, 0x896f, &(0x7f0000000000)={'team_slave_0\x00', @ifru_map}) 07:20:12 executing program 1: clock_gettime(0x6, &(0x7f0000000600)) 07:20:12 executing program 3: perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4040}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:20:13 executing program 0: r0 = socket$inet(0x2, 0x3, 0x7f) getsockopt$inet_int(r0, 0x0, 0x6, 0x0, &(0x7f0000000040)) 07:20:13 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:20:15 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:20:15 executing program 5: r0 = socket$inet(0x2, 0x3, 0x7f) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @l2tp={0x2, 0x0, @loopback}, @qipcrtr, @vsock={0x28, 0x0, 0x0, @local}}) 07:20:15 executing program 1: r0 = socket$inet(0x2, 0x3, 0x7f) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockname(r1, &(0x7f0000000140)=@xdp, &(0x7f00000001c0)=0x80) accept4(r1, &(0x7f0000000080)=@in, &(0x7f0000000100)=0x80, 0x800) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) 07:20:15 executing program 3: r0 = socket$inet(0x2, 0x3, 0x7f) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 07:20:15 executing program 0: socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) 07:20:15 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7f) ioctl$sock_ifreq(r0, 0x89b0, &(0x7f0000000080)={'syz_tun\x00', @ifru_flags}) 07:20:15 executing program 0: r0 = mq_open(&(0x7f0000000040)='io', 0x0, 0x0, 0x0) mq_timedreceive(r0, 0x0, 0x0, 0x0, 0x0) 07:20:15 executing program 3: openat$bsg(0xffffffffffffff9c, &(0x7f0000000340)='/dev/bsg\x00', 0x0, 0x0) 07:20:15 executing program 5: timer_create(0x0, &(0x7f0000000100), 0x0) 07:20:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0x7, 0xffffffffffffffff, 0x0) 07:20:15 executing program 4: keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f0000000340)='user\x00', 0x0) 07:20:15 executing program 4: socketpair(0xa, 0x1, 0x6, &(0x7f0000000380)) 07:20:18 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:20:18 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000880)='/dev/zero\x00', 0x34100, 0x0) 07:20:18 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000001f00)=[{{&(0x7f0000000740)=@xdp, 0x80, &(0x7f0000000ac0)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x2040, 0x0) 07:20:18 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4c000000160013"], 0x4c}}, 0x0) 07:20:18 executing program 5: syz_mount_image$fuse(&(0x7f0000000000)='fuse\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 07:20:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x2c}, 0x1, 0x0, 0x2}, 0x0) 07:20:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4c000000180213"], 0x4c}}, 0x0) 07:20:18 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:'}, &(0x7f0000000080)={0x0, "7d9e3ec9a677dafe7df1ce80c1de963aeff104711b4cb6fec1d9f1ed132a6da20fb42fe83bd08a644a7d80364d3851ffa09bd187c847fbaa90aff15bb059d168"}, 0x48, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0xf, r0, 0x0, 0xfffffffffffffffb, 0x0) 07:20:18 executing program 4: pipe2(&(0x7f0000000600), 0x0) fork() r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TRIM(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SET_FEATURE(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x20}, 0x20}}, 0x0) 07:20:18 executing program 5: r0 = inotify_init1(0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0189436, 0x1000000000543ffc) 07:20:18 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCGSERIAL(r0, 0x541e, 0x0) 07:20:18 executing program 0: clone3(&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000100)=""/36) 07:20:21 executing program 1: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000008c0)={0x0}) pselect6(0x40, &(0x7f0000000800)={0x6}, &(0x7f0000000840)={0x9}, &(0x7f0000000880), &(0x7f0000000900)={r0}, &(0x7f0000000980)={&(0x7f0000000940)={[0x73ffceb0]}, 0x8}) 07:20:21 executing program 5: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000000)='\x00', 0x8200003e) 07:20:21 executing program 3: clone3(&(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000001540)=[0xffffffffffffffff], 0x1}, 0x58) fork() 07:20:21 executing program 4: pipe2(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat$cgroup_procs(r0, &(0x7f0000000480)='cgroup.threads\x00', 0x2, 0x0) 07:20:21 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x114, 0x114, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x137}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:20:21 executing program 0: socketpair(0x11, 0x2, 0x0, &(0x7f00000001c0)) 07:20:21 executing program 5: syz_genetlink_get_family_id$nl802154(0xfffffffffffffffe, 0xffffffffffffffff) 07:20:21 executing program 0: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={0x0}) 07:20:22 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, 0x0) 07:20:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000440)=""/125, 0x7d}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xffffff68, 0x0, 0x0, 0x800e00547) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)=""/41, 0x29}, {0x0}], 0x2}, 0x2) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xfecc, 0x0, 0x0, 0x800e00505) shutdown(r3, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r5, &(0x7f0000000000)=[{&(0x7f0000001c00)="b426652889b178ebce91f988753e32ee65525659197452117a5d2e962fc3608386fdb450862af17c3dcaf2915a4dd93bd6511cbc9c8eaba240e3552a13f588442d8d86f43f6698bab04a9dd0503a28ee335547ff56d057ee9bd5377565bf8d35f5dff40081979e93c4cbbe6a0c73313e0797c044a695f619908341e1988996ddd4c642f8320484605a4a2a081a9b907cc1d63fc29d83b86a44395d7a35288ca69487fc6b50518510c94174ef5838474a0d8747a8b8f4adfcecb58315a07b4cf827011a8fe65afa7a30a2527acde3cfee5907eb37cb9204e747cf6acf7a5f375e5807d1145b6a7c", 0xfffffec5}], 0x1) shutdown(r4, 0x0) execve(0x0, 0x0, 0x0) 07:20:22 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0xffffff1f}, 0x0) 07:20:22 executing program 3: io_uring_setup(0x77ea, &(0x7f0000000100)={0x0, 0x396a, 0x2, 0x3, 0x219}) syz_genetlink_get_family_id$gtp(&(0x7f0000000380)='gtp\x00', 0xffffffffffffffff) 07:20:22 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000c80)=ANY=[@ANYRES16], 0x1c}}, 0x0) 07:20:22 executing program 5: syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x0, 0x0) 07:20:22 executing program 3: syz_genetlink_get_family_id$nl802154(&(0x7f00000005c0)='nl802154\x00', 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 07:20:22 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x200, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, 0xffffff57, 0x0}) 07:20:24 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x114, 0x114, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x137}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:20:24 executing program 3: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x209004, &(0x7f0000000480)=ANY=[]) 07:20:24 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000180)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_PREPARE_BUF(r0, 0xc058565d, 0x0) 07:20:24 executing program 4: setsockopt$nfc_llcp_NFC_LLCP_RW(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) 07:20:24 executing program 0: openat$incfs(0xffffffffffffff9c, &(0x7f0000001280)='.pending_reads\x00', 0x0, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000040), 0x0) 07:20:24 executing program 1: r0 = socket$qrtr(0x2a, 0x2, 0x0) recvmsg$qrtr(r0, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x38, 0x0) 07:20:25 executing program 1: syz_mount_image$v7(0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x401}], 0x0, &(0x7f0000000340)) 07:20:25 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='cdg\x00', 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='scalable\x00', 0x9) 07:20:25 executing program 5: syz_genetlink_get_family_id$ethtool(&(0x7f0000000500)='ethtool\x00', 0xffffffffffffffff) 07:20:25 executing program 0: syz_open_dev$vim2m(0x0, 0x0, 0x2) clock_gettime(0x0, &(0x7f00000001c0)) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000c40)='nl802154\x00', 0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000d40)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) 07:20:25 executing program 3: socket(0x10, 0x0, 0xa00000) [ 833.647303][T23052] loop1: detected capacity change from 0 to 4 [ 833.734226][T23052] loop1: detected capacity change from 0 to 4 07:20:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps_rollup\x00') preadv(r0, &(0x7f0000001600)=[{&(0x7f0000000300)=""/82, 0x52}], 0x1, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 07:20:28 executing program 5: r0 = socket(0x2, 0x3, 0x6) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x8914, 0x0) 07:20:28 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCDELRT(r0, 0x890b, 0x0) 07:20:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x114, 0x114, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x137}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:20:28 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001180)={&(0x7f0000000000), 0xfffffffffffffe1b, &(0x7f0000001140)={0x0}}, 0x0) 07:20:28 executing program 0: pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x104000, 0x0, 0xffffffffffffffff) 07:20:28 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @local}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB='A'], 0x14}}, 0x0) 07:20:28 executing program 0: r0 = socket(0x2, 0x3, 0x6) getsockname$l2tp6(r0, 0x0, &(0x7f0000000200)) 07:20:28 executing program 5: r0 = semget$private(0x0, 0x3, 0x0) semop(r0, &(0x7f0000000200)=[{0x0, 0x0, 0x1000}], 0x1) semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1400}], 0x1) 07:20:28 executing program 1: syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 07:20:28 executing program 4: timer_create(0x0, 0x0, &(0x7f00000001c0)) 07:20:28 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180)='802.15.4 MAC\x00', r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000040)={'wpan0\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_KEY(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r3}]}, 0x1c}}, 0x0) 07:20:28 executing program 4: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x1c, r3, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}]}, 0x1c}}, 0x0) 07:20:28 executing program 0: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r0, &(0x7f0000000080), 0x0) 07:20:31 executing program 1: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={'digest_null\x00'}}) 07:20:31 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000004040)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30}, 0x30) 07:20:31 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe4, 0xe4, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x107}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:20:31 executing program 4: socket(0xa, 0x0, 0xfffffffc) 07:20:31 executing program 0: r0 = socket(0x18, 0x0, 0x2) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x0, @local, 'veth0_vlan\x00'}}, 0x1e) 07:20:31 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000800)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c) 07:20:31 executing program 0: syz_mount_image$jfs(&(0x7f0000002640)='jfs\x00', &(0x7f0000002680)='./file0\x00', 0x0, 0x0, &(0x7f0000002f80), 0x0, &(0x7f0000003040)={[{@integrity='integrity'}]}) 07:20:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@ipv6_newroute={0x1c, 0x18, 0x1, 0x0, 0x0, {0xa, 0x0, 0x10}}, 0x1c}}, 0x0) 07:20:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@ipv6_newroute={0x1c, 0x18, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}, 0x1c}}, 0x0) 07:20:31 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_delroute={0x24, 0x19, 0x1, 0x0, 0x0, {}, [@RTA_IIF={0x8}]}, 0x24}}, 0x0) 07:20:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="940100001200d7d8b6bbd7e13d7ffc229f18ecf783"], 0x194}}, 0x0) 07:20:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@ipv6_newroute={0x28, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_MULTIPATH={0xc, 0x9, {0x100}}]}, 0x28}}, 0x0) [ 839.992851][T23163] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 840.000655][T23163] IPv6: NLM_F_CREATE should be set when creating new route [ 840.027668][T23165] netlink: 372 bytes leftover after parsing attributes in process `syz-executor.5'. 07:20:31 executing program 3: openat$nvram(0xffffffffffffff9c, &(0x7f00000028c0)='/dev/nvram\x00', 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000045c0)='/dev/fuse\x00', 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="8c00000015005fca2cbd7000fedbdf250a402003", @ANYRES32=r1, @ANYBLOB="140002"], 0x8c}}, 0x0) [ 840.053750][T23159] Mount JFS Failure: -22 07:20:31 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x65, 0x0, &(0x7f0000000040)) [ 840.090550][T23159] jfs_mount failed w/return code = -22 [ 840.227246][T23170] netlink: 96 bytes leftover after parsing attributes in process `syz-executor.3'. 07:20:34 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe4, 0xe4, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x107}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:20:34 executing program 1: inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000040)) ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x18, 0x5, &(0x7f0000000900)=@framed={{0x18, 0x0, 0x0, 0x0, 0x95f3, 0x0, 0x0, 0x0, 0x40}, [@exit, @exit]}, &(0x7f0000000940)='GPL\x00', 0xd3d0, 0x5a, &(0x7f0000000980)=""/90, 0x40f00, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000b40)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000b80)={0x2, 0x4, 0x8, 0x2}, 0x10}, 0x78) 07:20:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f00000000c0)=0x7000000, 0x4) 07:20:34 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000000)=@raw=[@call], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:34 executing program 4: clock_gettime(0x1, &(0x7f00000007c0)) 07:20:34 executing program 3: madvise(&(0x7f0000ff5000/0x8000)=nil, 0x8000, 0xc) 07:20:34 executing program 4: mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0xffffffffffffffff) 07:20:34 executing program 0: shmget$private(0x0, 0x3000, 0x78000904, &(0x7f0000ffd000/0x3000)=nil) 07:20:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3c0000001500010027bd7000fbdbdf250a"], 0x3c}}, 0x0) 07:20:34 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x601, 0x0) 07:20:34 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000700)={[{@sb={'sb', 0x3d, 0xffffffffffffffc1}}]}) 07:20:34 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe4, 0xe4, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x107}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:20:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@ipv6_newrule={0x34, 0x20, 0xabe6fc4120683f17, 0x0, 0x0, {}, [@FIB_RULE_POLICY=@FRA_DPORT_RANGE={0x8, 0x18, {0x4e22, 0x4e22}}, @FIB_RULE_POLICY=@FRA_FWMARK={0x8, 0xa, 0x2}, @FIB_RULE_POLICY=@FRA_TABLE={0x8, 0xf, 0x9e8}]}, 0x34}}, 0x0) [ 843.084828][T23208] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 843.091292][ C1] blk_update_request: I/O error, dev loop3, sector 18446744073709551490 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 843.107580][T23205] EXT4-fs (loop3): unable to read superblock 07:20:34 executing program 0: shmget$private(0x0, 0x3000, 0x78000904, &(0x7f0000ffd000/0x3000)=nil) 07:20:34 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xc0189436, 0x400000) [ 843.161115][ C1] blk_update_request: I/O error, dev loop3, sector 18446744073709551490 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 843.180481][T23205] EXT4-fs (loop3): unable to read superblock 07:20:34 executing program 5: io_setup(0x5a6, &(0x7f0000000480)) 07:20:34 executing program 3: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f0000000200)={0x0, "cc36b1243cd3e844ed88c4c250d67109cac759f1e01579407a48ffde4a90692e846831a5e342886400075cf418102eaa04c38d8acac9152a5cc317f4082e86cb"}, 0x48, r2) 07:20:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x17, 0xa, 0x201}, 0x14}}, 0x0) 07:20:34 executing program 0: shmget$private(0x0, 0x3000, 0x78000904, &(0x7f0000ffd000/0x3000)=nil) 07:20:35 executing program 1: r0 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000000)='ns/user\x00') ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 07:20:35 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x123402) writev(r0, &(0x7f0000000bc0)=[{&(0x7f0000000680)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70b12535b38940d748bc0ec6c000000001b1bab0525dcda9f60dd168581a4095dc9fab22c7600f8d85f960511335d85", 0x58}], 0x1) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000000380)) 07:20:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xaaaaaaaaaaaabf0, &(0x7f00000004c0)=[{&(0x7f00000003c0)="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", 0xfd, 0x7}], 0x1000080, &(0x7f0000000540)=ANY=[@ANYRESOCT]) 07:20:35 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$negate(0x4, r0, 0x10, 0xfffffffffffffffa) 07:20:37 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x118, 0x118, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x13b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:20:37 executing program 0: shmget$private(0x0, 0x3000, 0x78000904, &(0x7f0000ffd000/0x3000)=nil) 07:20:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x0, 0x0, &(0x7f0000000040)) 07:20:37 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001280)=[{&(0x7f00000001c0)="b2", 0x1, 0x3404}], 0x0, 0x0) 07:20:37 executing program 4: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsu\x00', 0x0, 0x0) fanotify_mark(r0, 0x80, 0x0, 0xffffffffffffff9c, 0x0) 07:20:37 executing program 3: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RCREATE(r0, &(0x7f0000000240)={0x18}, 0x18) 07:20:37 executing program 1: waitid(0x0, 0x0, &(0x7f0000000500), 0x0, 0x0) [ 846.129432][T23263] loop5: detected capacity change from 0 to 52 07:20:37 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000002c80)=[{{&(0x7f0000000000)={0x2, 0x4e20}, 0x10, 0x0}}], 0x1, 0x0) 07:20:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x844, &(0x7f00000006c0)=ANY=[@ANYBLOB]) 07:20:37 executing program 3: mremap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffa000/0x2000)=nil) 07:20:37 executing program 4: syz_mount_image$fuse(&(0x7f0000001c40)='fuse\x00', &(0x7f0000001c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001cc0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xefb87e9034670959}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 846.370614][T23281] fuse: Bad value for 'fd' 07:20:37 executing program 5: madvise(&(0x7f0000ff7000/0x7000)=nil, 0x7000, 0xf) [ 846.390976][T23281] fuse: Bad value for 'fd' [ 846.418477][T23283] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 846.442717][T23284] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 846.610996][T23284] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 07:20:40 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x118, 0x118, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x13b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:20:40 executing program 3: r0 = socket(0x2, 0xa, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, 0x0, 0x0) 07:20:40 executing program 4: syz_mount_image$fuse(&(0x7f0000000000)='fuse\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}}) 07:20:40 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x5421, 0x400000) 07:20:40 executing program 5: semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000040)=""/4096) 07:20:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) io_setup(0x33, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000200)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1}]) 07:20:40 executing program 1: syz_io_uring_setup(0x2ffc, &(0x7f0000000000)={0x0, 0xbb1c, 0x8}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 07:20:40 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000080)) [ 849.318093][T23314] fuse: Bad value for 'fd' [ 849.330951][T23314] fuse: Bad value for 'fd' 07:20:40 executing program 4: shmat(0x0, &(0x7f0000ffa000/0x2000)=nil, 0x6000) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1) 07:20:40 executing program 3: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x3, &(0x7f0000001280)=[{&(0x7f0000000180)="c6", 0x1}, {&(0x7f00000001c0)="b2", 0x1, 0x3404}, {&(0x7f00000011c0)='\f', 0x1}], 0x0, 0x0) 07:20:40 executing program 0: shmat(0x0, &(0x7f0000ff9000/0x6000)=nil, 0x7000) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 07:20:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14}, 0x20000154}}, 0x0) [ 849.578551][T23328] loop3: detected capacity change from 0 to 52 [ 849.696466][T23328] loop3: detected capacity change from 0 to 52 07:20:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x118, 0x118, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x13b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:20:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x3}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000080)={r2, 0x0, 0x1}) 07:20:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB=' \x00r'], 0x20}}, 0x0) 07:20:43 executing program 4: add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "be73a637457a6b7a536ee5d115e926f4557e886e09eb87f95453bfab942c29a1a0009fe2cd20f7169a4327fc583c0fed4458f9d4ff494cab1bf3f7607dc642c2"}, 0x48, 0xfffffffffffffffb) 07:20:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=@ipv4_delroute={0x24, 0x19, 0x801, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6}]}, 0x24}}, 0x0) 07:20:43 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/netstat\x00') write$tun(r0, 0x0, 0x0) 07:20:44 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/19, 0x13) 07:20:44 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0xae6a5820911a7440, 0x0) 07:20:44 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000180)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000040)=@raw=[@btf_id], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 07:20:44 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 07:20:44 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000002c80)=[{{&(0x7f0000000000)={0x2, 0x4e20}, 0x10, 0x0, 0x0, &(0x7f0000000580)=[@ip_tos_u8={{0x11}}, @ip_retopts={{0x1c, 0x0, 0x7, {[@generic={0x7, 0x3, 'i'}, @noop, @end, @cipso={0x86, 0x6}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr, @multicast1}}}], 0x58}}], 0x1, 0x0) 07:20:44 executing program 0: socketpair(0x2, 0x0, 0x0, &(0x7f00000001c0)) 07:20:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x118, 0x118, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x13b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:20:46 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x1, 0x0) write$P9_RLINK(r0, 0x0, 0x0) 07:20:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x100000001, 0xaaaaaaaaaaaabf0, &(0x7f00000004c0)=[{&(0x7f00000003c0)="0520cc40c181ba0e13966712f54be86ec0ef9d5181e3a5742e55f31ebea62294267fa15ca04eccad69e257e00106f52a53fe7a2e2e791db8d0fd5ea715f7d91bf02db85e943be273de6e81ba236d7aea6da27f0c931f8d002f497d73130d32e36eafea0934dd75875777cf434953be176a5e95bacc835655cb1bafb00c5a2970db0672187cb51726c6769d3683b392df7b335adf6f68505245ded8bbf90c3d72d2be6e93c0a9dd70255c1a6226711530ad3ccf78bbff3f8b1661d51de7097774ba72aa6c6798a61199150e77d8e95706c4ffc980f4729406e7da742f48041c7e7ef08480dd637809ce1ce0182c73de74a24b104b3fa2b86c0f4de6afc8", 0xfd, 0x7}], 0x1000080, &(0x7f0000000540)=ANY=[@ANYRESOCT]) 07:20:46 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000100)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000300)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:46 executing program 1: syz_open_procfs(0x0, &(0x7f0000004400)='timerslack_ns\x00') 07:20:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x50, r0, 0xa3eb0000) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$BLKBSZGET(r4, 0x80081270, &(0x7f00000000c0)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000100)={r2, 0x1, 0x1, r6}) 07:20:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SMC_PNETID_DEL(r0, &(0x7f00000001c0)={&(0x7f0000000040), 0x5, &(0x7f0000000100)={&(0x7f0000000200)={0x74, 0x0, 0x0, 0x0, 0x0, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'veth0_to_team\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT, @SMC_PNETID_NAME={0x0, 0x1, 'syz2\x00'}, @SMC_PNETID_NAME={0x0, 0x1, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5}]}, 0x74}}, 0x0) 07:20:47 executing program 5: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$negate(0x2, r0, 0x0, 0x0) 07:20:47 executing program 1: madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4) 07:20:47 executing program 0: syz_genetlink_get_family_id$nl802154(&(0x7f0000000000)='nl802154\x00', 0xffffffffffffffff) clock_gettime(0x6, &(0x7f00000002c0)) 07:20:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@bridge_newvlan={0x18, 0x70, 0x59471ad0ad8f9393}, 0x18}}, 0x0) 07:20:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x844, &(0x7f00000006c0)=ANY=[]) [ 856.038256][T23434] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 856.097504][T23434] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 07:20:50 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x118, 0x118, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x13b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:20:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000002500)={&(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10, 0x0, 0x0, &(0x7f0000002480)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x19, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0]}]}}}], 0x48}, 0x4004014) 07:20:50 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) sendmmsg(r0, 0x0, 0x0, 0x0) 07:20:50 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) sendmsg$xdp(r0, &(0x7f0000000300)={&(0x7f0000001680), 0x10, &(0x7f0000001980), 0x44}, 0x0) 07:20:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0xc020660b, 0x0) 07:20:50 executing program 4: syz_io_uring_setup(0x2ffc, &(0x7f0000000000)={0x0, 0xbb1c, 0x0, 0x2, 0x13d}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 07:20:50 executing program 5: msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x7) 07:20:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x81, 0x1, &(0x7f0000000400)=[{0x0}], 0x0, &(0x7f0000000480)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000380)={[{@nouid32='nouid32'}], [{@smackfsroot={'smackfsroot', 0x3d, '1'}}]}) 07:20:50 executing program 1: getgroups(0x2, &(0x7f0000000000)=[0xee01, 0xffffffffffffffff]) setregid(r0, 0xee01) 07:20:50 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x2, 0xc04a01) 07:20:50 executing program 4: prctl$PR_SET_MM(0x23, 0xc, &(0x7f0000ffb000/0x4000)=nil) 07:20:50 executing program 5: add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) [ 858.861314][T23475] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 859.010459][T23484] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 07:20:53 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x118, 0x118, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x13b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:20:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000000)=@ipx={0x4, 0x0, 0x0, "e47bfda0809f"}, 0x80) 07:20:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[], 0x0, 0x0) 07:20:53 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd\x00') 07:20:53 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000002c80)=[{{&(0x7f0000000000)={0x2, 0x4e20}, 0x10, 0x0, 0x0, &(0x7f0000000580)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@generic={0x7, 0x3, 'i'}, @noop, @end, @cipso={0x86, 0x6}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010100, @multicast1}}}], 0x60}}], 0x1, 0x0) 07:20:53 executing program 3: mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f0000000000)=""/115) 07:20:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="01"], 0x2c}}, 0x0) 07:20:53 executing program 1: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x2080, 0x0) 07:20:53 executing program 3: socketpair(0xa, 0x3, 0x4, &(0x7f00000000c0)) 07:20:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000072700)) 07:20:53 executing program 4: syz_mount_image$fuse(&(0x7f0000000000)='fuse\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read'}}]}}) 07:20:53 executing program 1: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x2080, 0x0) [ 861.968400][T23519] fuse: Bad value for 'fd' [ 861.996978][T23519] fuse: Bad value for 'fd' 07:20:56 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x3, &(0x7f0000000300)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x78) 07:20:56 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="380000006404"], 0x38}}, 0x0) 07:20:56 executing program 1: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x2080, 0x0) 07:20:56 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x118, 0x118, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x13b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:20:56 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) fork() r0 = fork() process_vm_writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/215, 0xd7}], 0x1, &(0x7f0000000680)=[{&(0x7f0000000500)=""/104, 0x68}], 0x1, 0x0) 07:20:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000002500)={&(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10, 0x0}, 0x4004014) 07:20:56 executing program 1: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x2080, 0x0) 07:20:56 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 07:20:56 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x101841, 0x0) ioctl$KVM_CREATE_VM(r0, 0xc0189436, 0x400000) 07:20:56 executing program 4: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, 0x0, 0x0) 07:20:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1400000017069f"], 0x14}}, 0x0) 07:20:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000200)}, 0x20) 07:20:56 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000280)='/dev/vcsu#\x00', 0x0, 0x0) connect$netlink(r0, 0x0, 0x0) 07:20:56 executing program 0: mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffd000/0x1000)=nil) 07:20:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@ipv6_newrule={0x48, 0x20, 0xabe6fc4120683f17, 0x0, 0x0, {0xa, 0x20}, [@FIB_RULE_POLICY=@FRA_DPORT_RANGE={0x8, 0x18, {0x4e22, 0x4e22}}, @FIB_RULE_POLICY=@FRA_FWMARK={0x8, 0xa, 0x2}, @FIB_RULE_POLICY=@FRA_TABLE={0x8, 0xf, 0x9e8}, @FRA_DST={0x14, 0x1, @mcast1}]}, 0x48}}, 0x0) 07:20:59 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x118, 0x118, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x13b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:20:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000002500)={&(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10, 0x0}, 0x0) 07:20:59 executing program 0: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001280)=[{&(0x7f0000000180)="c6", 0x1}], 0x0, &(0x7f0000001400)) 07:20:59 executing program 4: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0, 0xb) 07:20:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) 07:20:59 executing program 5: shmat(0x0, &(0x7f0000ff9000/0x6000)=nil, 0x7000) 07:20:59 executing program 1: socketpair(0x2, 0x2, 0x1, &(0x7f00000001c0)) 07:20:59 executing program 4: keyctl$negate(0x11, 0x0, 0x0, 0xfffffffffffffffa) 07:20:59 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000100)=@raw=[@ldst, @alu], &(0x7f0000000140)='GPL\x00', 0x8000, 0x93, &(0x7f0000000180)=""/147, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:59 executing program 0: msgctl$IPC_SET(0x0, 0x2, &(0x7f0000000280)={{0x1, 0xee00, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) 07:20:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000280)={'batadv0\x00'}) 07:20:59 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f00000005c0)=[{0x3}]}) [ 869.940607][ T3251] ieee802154 phy0 wpan0: encryption failed: -22 [ 869.946946][ T3251] ieee802154 phy1 wpan1: encryption failed: -22 07:21:02 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x118, 0x118, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x13b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:21:02 executing program 1: openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0x22042, 0x0) 07:21:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000200)={@local, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) 07:21:02 executing program 4: mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000ff4000/0x4000)=nil) 07:21:02 executing program 0: fork() r0 = fork() process_vm_writev(r0, &(0x7f00000004c0)=[{0x0}], 0x1, 0x0, 0x0, 0x0) 07:21:02 executing program 5: syz_genetlink_get_family_id$netlbl_unlabel(0x0, 0xffffffffffffffff) 07:21:02 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xc0189436, 0x40b701) 07:21:02 executing program 4: io_uring_setup(0x68e0, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x382}) 07:21:02 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000002c80)=[{{&(0x7f0000000000)={0x2, 0x4e20}, 0x10, 0x0, 0x0, &(0x7f0000000580)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@generic={0x7, 0x3, 'i'}, @noop, @end, @cipso={0x86, 0x6}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010100, @multicast1}}}], 0x40}}], 0x1, 0x0) 07:21:02 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0xc0d01, 0x0) ioctl$KVM_CREATE_VM(r0, 0x5450, 0x0) 07:21:02 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x0, 0x0) accept4$alg(r0, 0x0, 0x0, 0x1800) 07:21:02 executing program 3: socketpair(0x2, 0x0, 0x10001, &(0x7f00000001c0)) 07:21:05 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x118, 0x118, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x13b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:21:05 executing program 5: r0 = fork() process_vm_writev(r0, &(0x7f0000001a40)=[{&(0x7f0000000140)=""/234, 0xea}], 0x1, &(0x7f0000000480)=[{&(0x7f0000000240)=""/40, 0x28}, {&(0x7f0000001ac0)=""/88, 0x58}], 0x2, 0x0) 07:21:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff, 0x1000) 07:21:05 executing program 4: prctl$PR_SET_MM(0x23, 0xb, &(0x7f0000002000/0x3000)=nil) 07:21:05 executing program 0: wait4(0x0, 0x0, 0x1000000, &(0x7f0000000100)) 07:21:05 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, 0x0, 0x0) 07:21:05 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000180)) 07:21:05 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, 0x0) 07:21:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x123402) writev(r1, &(0x7f0000000bc0)=[{&(0x7f0000000680)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70b12535b38940d748bc0ec6c000000001b1bab0525dcda9f60dd168581a4095dc9fab22c7600f8d85f960511335d85", 0x58}], 0x1) ppoll(&(0x7f0000000100)=[{r1}], 0x1, &(0x7f00000001c0)={0x0, 0x3938700}, 0x0, 0x0) 07:21:05 executing program 5: mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3, &(0x7f0000000000)=0x5, 0x9e6, 0x0) 07:21:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@ipv6_newrule={0x1c, 0x20, 0xabe6fc4120683f17, 0x0, 0x0, {0xa, 0x20}}, 0x1c}}, 0x0) 07:21:05 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0x19, 0x0, 0x0) 07:21:08 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x118, 0x118, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x13b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:21:08 executing program 4: mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) 07:21:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x123402) writev(r1, &(0x7f0000000bc0)=[{&(0x7f0000000680)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70b12535b38940d748bc0ec6c000000001b1bab0525dcda9f60dd168581a4095dc9fab22c7600f8d85f960511335d85", 0x58}], 0x1) ppoll(&(0x7f0000000100)=[{r1}], 0x1, &(0x7f00000001c0)={0x0, 0x3938700}, 0x0, 0x0) 07:21:08 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) inotify_rm_watch(r0, 0x0) 07:21:08 executing program 5: r0 = getpgrp(0x0) sched_rr_get_interval(r0, &(0x7f0000000100)) 07:21:08 executing program 0: socketpair(0x2, 0x2, 0x0, &(0x7f0000000040)) 07:21:08 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)={[{@nr_blocks={'nr_blocks', 0x3d, [0x74, 0x34]}}]}) 07:21:08 executing program 5: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) 07:21:08 executing program 1: request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f0000000540)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) 07:21:08 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x1, 0x0) write$FUSE_INIT(r0, 0x0, 0x0) 07:21:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x123402) writev(r1, &(0x7f0000000bc0)=[{&(0x7f0000000680)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70b12535b38940d748bc0ec6c000000001b1bab0525dcda9f60dd168581a4095dc9fab22c7600f8d85f960511335d85", 0x58}], 0x1) ppoll(&(0x7f0000000100)=[{r1}], 0x1, &(0x7f00000001c0)={0x0, 0x3938700}, 0x0, 0x0) [ 877.534942][T23726] tmpfs: Bad value for 'nr_blocks' 07:21:09 executing program 1: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x100000001, 0xaaaaaaaaaaaabf0, &(0x7f00000004c0)=[{&(0x7f00000003c0)="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", 0xfd, 0x7}], 0x1000080, &(0x7f0000000540)=ANY=[@ANYRESOCT]) [ 877.572926][T23726] tmpfs: Bad value for 'nr_blocks' 07:21:11 executing program 5: mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) 07:21:11 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x1}, 0x40) 07:21:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x118, 0x118, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x13b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:21:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x123402) writev(r1, &(0x7f0000000bc0)=[{&(0x7f0000000680)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70b12535b38940d748bc0ec6c000000001b1bab0525dcda9f60dd168581a4095dc9fab22c7600f8d85f960511335d85", 0x58}], 0x1) ppoll(&(0x7f0000000100)=[{r1}], 0x1, &(0x7f00000001c0)={0x0, 0x3938700}, 0x0, 0x0) 07:21:11 executing program 1: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x60800) 07:21:11 executing program 0: unshare(0x4000400) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x1, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={0x0, r0}, 0x10) 07:21:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) bind(r0, &(0x7f0000000000)=@isdn, 0x80) 07:21:12 executing program 5: mremap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x2000, 0x4, &(0x7f0000ffa000/0x2000)=nil) 07:21:12 executing program 1: mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3, 0x0, 0x0, 0x0) 07:21:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@ipv6_newrule={0x1c, 0x20, 0xabe6fc4120683f17}, 0x1c}}, 0x0) 07:21:12 executing program 0: unshare(0x4000400) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x1, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={0x0, r0}, 0x10) 07:21:12 executing program 4: mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) syz_io_uring_setup(0x1ea3, &(0x7f00000000c0), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140), &(0x7f0000000180)) 07:21:12 executing program 5: mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) 07:21:12 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000000500), 0x8, &(0x7f0000000200)) 07:21:14 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x118, 0x118, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x13b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:21:14 executing program 0: unshare(0x4000400) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x1, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={0x0, r0}, 0x10) 07:21:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000080)=0x6, 0x4) 07:21:14 executing program 1: syz_mount_image$fuse(&(0x7f0000000000)='fuse\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id'}}) 07:21:14 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) 07:21:14 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x1004, 0x1, 0x19}, 0x40) [ 883.514911][T23796] fuse: Bad value for 'fd' [ 883.563695][T23796] fuse: Bad value for 'fd' 07:21:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)=@ipv6_delroute={0xc4, 0x19, 0x1, 0x0, 0x0, {0xa, 0x0, 0x10, 0x0, 0x0, 0x2, 0x0, 0x0, 0x200}, [@RTA_ENCAP={0xc, 0x16, 0x0, 0x1, @LWTUNNEL_IP_TOS={0x5}}, @RTA_MULTIPATH={0xc, 0x9, {0xd25a, 0x0, 0x9}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "e733018d11e15f4c86d384c3e7f46aedfd6eafb8296dfdcdbfd3273e45513e9b0c5d4ce05a5861b31e441cd67ee86854def11b999649c64b6d3a644ec7f057268876b5d4b24d14fb982b34cd8fb732585ace6b60edce540f8b5faa22202da3aee1bfa5f24d215345078315e4a811bc76326d3780f18d6dfcdc47865e434f742563"}, @RTA_PREF={0x5}]}, 0xc4}}, 0x4000) 07:21:15 executing program 4: mknodat$null(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x1000, 0x103) 07:21:15 executing program 0: unshare(0x4000400) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x1, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={0x0, r0}, 0x10) 07:21:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000200), 0x4) 07:21:15 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x7800) 07:21:15 executing program 5: capset(&(0x7f0000000340)={0x19980330}, 0x0) [ 883.958132][T23818] capability: warning: `syz-executor.5' uses 32-bit capabilities (legacy support in use) 07:21:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000040), 0x4) 07:21:18 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x118, 0x118, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x13b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:21:18 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) syz_io_uring_setup(0xbdd, &(0x7f00000001c0)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) 07:21:18 executing program 3: msgctl$IPC_SET(0x0, 0x3, &(0x7f0000000280)={{0x1, 0xee00, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) 07:21:18 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:21:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000001a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x6002, 0x0) 07:21:18 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000001140)='net/rt_cache\x00') 07:21:18 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000001440), 0x8010, &(0x7f00000017c0)={[{@fat=@check_normal='check=normal'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}]}) 07:21:18 executing program 3: munmap(&(0x7f0000ff3000/0xd000)=nil, 0xd000) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) 07:21:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@ipv6_newrule={0x24, 0x20, 0xabe6fc4120683f17, 0x0, 0x0, {}, [@FIB_RULE_POLICY=@FRA_FWMARK={0x8}]}, 0x24}}, 0x0) 07:21:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000004180)=[{{0x0, 0x0, 0x0, 0xf8}}], 0x1, 0x0, 0x0) 07:21:18 executing program 1: mlock2(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) munlock(&(0x7f0000003000/0x3000)=nil, 0x3000) 07:21:18 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0x16, 0x0, 0x0) 07:21:21 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x118, 0x118, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x13b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:21:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00'}) 07:21:21 executing program 4: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="8b", 0x1, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$link(0x8, r0, r1) 07:21:21 executing program 0: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) clone(0x7a900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000388000/0x1000)=nil, 0x1000, 0x65) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) mmap(&(0x7f00000dd000/0x3000)=nil, 0x3000, 0x19, 0x10, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x6000) 07:21:21 executing program 3: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, 0xffffffffffffffff) 07:21:21 executing program 5: munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000000)=""/41) 07:21:21 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x2, 0x970000) 07:21:21 executing program 0: fanotify_init(0x64, 0x0) 07:21:21 executing program 3: socket$inet6(0xa, 0xf, 0x0) 07:21:21 executing program 1: semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000000)=""/130) 07:21:21 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000180)={0x0, "147f45e135c40f1946fee33c15ada9874b21227b08b67af11b1538e77128a65c5b177ac6c0ad9fe4a69b515482d7b1296aaed099622158ab46756fbd426abb65"}, 0x48, 0xfffffffffffffffe) keyctl$search(0xa, r0, &(0x7f0000000200)='encrypted\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0) 07:21:21 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$KDFONTOP_COPY(r0, 0x4b72, 0x0) 07:21:24 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:21:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000002e000187"], 0x30}}, 0x0) 07:21:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@getlink={0x20, 0x12, 0x101}, 0x20}}, 0x0) 07:21:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="300000002e0001"], 0x30}}, 0x0) 07:21:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@ipv4_delroute={0x28, 0x19, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0xfd}, [@RTA_METRICS={0x4}, @RTA_DST={0x8, 0x1, @remote}]}, 0x28}}, 0x0) 07:21:24 executing program 4: capset(&(0x7f0000000340)={0x19980330}, &(0x7f0000000380)={0x3f}) [ 892.855184][T23920] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 892.874414][T23922] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 07:21:24 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=@ipv6_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_PRIORITY={0x8, 0x6, 0x80000001}]}, 0x24}}, 0x0) 07:21:24 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x74, 0x0, 0x0, 0x81}]}) 07:21:24 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x4, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xffffc8b8}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00', 0xffffffffffffffff) 07:21:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_timeval(r0, 0x1, 0x28, 0x0, &(0x7f00000000c0)) 07:21:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@ipv6_delroute={0x38, 0x19, 0x1, 0x0, 0x0, {}, [@RTA_PRIORITY={0x8, 0x6, 0x5}, @RTA_ENCAP_TYPE={0x6}, @RTA_MULTIPATH={0xc, 0x9, {0x8}}]}, 0x38}}, 0x0) [ 893.063896][T23931] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 893.072241][T23931] IPv6: NLM_F_CREATE should be set when creating new route 07:21:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@ipv6_newaddrlabel={0x11, 0x48, 0x1, 0x0, 0x0, {}, [@IFAL_LABEL={0x8}, @IFAL_ADDRESS={0x14, 0x1, @private2}]}, 0x38}}, 0x0) [ 893.126924][ T37] audit: type=1326 audit(1617952884.623:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23930 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0xffff0000 07:21:27 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:21:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000100001"], 0x1c}}, 0x0) 07:21:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB="340000001100"/20, @ANYBLOB="01"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="940100001200d7"], 0x194}}, 0x0) 07:21:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@ipv6_newaddrlabel={0x38, 0x48, 0x1, 0x0, 0x0, {}, [@IFAL_ADDRESS={0x14, 0x1, @private0}, @IFAL_LABEL={0x8}]}, 0x38}}, 0x0) 07:21:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@ipv6_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 07:21:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000001900010000000000000000000a00200000040000000a"], 0x1c}}, 0x0) [ 895.946111][T23956] netlink: 372 bytes leftover after parsing attributes in process `syz-executor.0'. [ 895.983112][T23960] netlink: 372 bytes leftover after parsing attributes in process `syz-executor.0'. 07:21:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=@bridge_getlink={0x34, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'netpci0\x00'}]}, 0x34}}, 0x0) 07:21:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000045c0)='/dev/fuse\x00', 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="8c00000015005fca2cbd7000fedbdf250a402003", @ANYRES32=r1, @ANYBLOB="140002"], 0x8c}}, 0x0) 07:21:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv4_newrule={0x1c, 0x20, 0x1, 0x0, 0x0, {0x2, 0x0, 0x10}}, 0x1c}}, 0x0) 07:21:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="940100001200d729"], 0x194}}, 0x0) 07:21:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000180001fb0000000000842f000a00000000000008"], 0x24}}, 0x0) 07:21:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="8c00000015005fca2cbd", @ANYRES32, @ANYBLOB="d5ff028fcd2117"], 0x8c}}, 0x0) [ 896.208269][T23969] netlink: 96 bytes leftover after parsing attributes in process `syz-executor.4'. [ 896.260339][T23973] netlink: 96 bytes leftover after parsing attributes in process `syz-executor.4'. [ 896.293917][T23974] netlink: 372 bytes leftover after parsing attributes in process `syz-executor.1'. [ 896.315265][T23975] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 896.356897][T23975] IPv6: NLM_F_REPLACE set, but no existing node found! [ 896.372574][T23974] netlink: 372 bytes leftover after parsing attributes in process `syz-executor.1'. [ 896.422732][T23979] netlink: 116 bytes leftover after parsing attributes in process `syz-executor.3'. 07:21:30 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x118, 0x118, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x13b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:21:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="380000004800010000000000000000000a000000", @ANYRES32=0x0, @ANYBLOB="000000000800020000000000140001000000000000000009"], 0x38}}, 0x0) 07:21:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@ipv4_delroute={0x24, 0x19, 0x1, 0x0, 0x0, {}, [@RTA_DST={0x8, 0x1, @remote}]}, 0x24}}, 0x0) 07:21:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000005c0)=@ipv4_newrule={0x24, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_GOTO={0x8}]}, 0x24}}, 0x0) 07:21:30 executing program 1: prlimit64(0x0, 0x7, &(0x7f0000002200)={0x0, 0xffffffffffffffff}, 0x0) 07:21:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv6_delroute={0x40, 0x19, 0x1, 0x0, 0x0, {}, [@RTA_ENCAP={0x10, 0x16, 0x0, 0x1, @SEG6_LOCAL_BPF={0xc, 0x8, 0x0, 0x1, @SEG6_LOCAL_BPF_PROG={0x8}}}, @RTA_PRIORITY={0x8}, @RTA_METRICS={0x4}, @RTA_ENCAP_TYPE={0x6}]}, 0x40}}, 0x0) 07:21:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=@bridge_getlink={0x20, 0x12, 0x1}, 0x20}}, 0x0) 07:21:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="380000001900010027bd7000fedbdf250208aac04f"], 0x38}}, 0x0) 07:21:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@ipv6_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0xa, 0x14}}, 0x1c}}, 0x0) 07:21:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000004a00fb8d6d6d0000000000000a"], 0x1c}}, 0x0) 07:21:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@ipv6_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) [ 899.327728][T24008] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 07:21:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, 0x0, 0x0) 07:21:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c00000018000100000000000000000002"], 0x1c}}, 0x0) 07:21:33 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x118, 0x118, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x13b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:21:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f00000024c0)=[{{&(0x7f0000000000)={0x2, 0x4e24}, 0x10, 0x0, 0x0, &(0x7f0000001580)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev, @local}}}], 0x20}}], 0x1, 0x0) 07:21:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=@ipv4_delroute={0x28, 0x19, 0x1, 0x0, 0x0, {}, [@RTA_MULTIPATH={0xc}]}, 0x28}}, 0x0) 07:21:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000005c0)=@bridge_newneigh={0x24, 0x1c, 0x1, 0x0, 0x0, {}, [@NDA_DST_IPV4={0x8, 0x1, @remote}]}, 0x24}}, 0x0) 07:21:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c0000001800010400000000000000000ae5"], 0x1c}}, 0x0) 07:21:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x2c, &(0x7f0000000140)={&(0x7f0000000000)=@ipv6_newaddrlabel={0x38, 0x48, 0x1, 0x0, 0x0, {}, [@IFAL_ADDRESS={0x14, 0x1, @loopback}, @IFAL_LABEL={0x8}]}, 0x38}}, 0x0) 07:21:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@ipv6_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0xa, 0x90}}, 0x1c}}, 0x0) 07:21:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="8c00000015005fca2cbd", @ANYRES32, @ANYBLOB="140002"], 0x8c}}, 0x0) 07:21:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@ipv6_delroute={0x28, 0x19, 0x221, 0x0, 0x0, {}, [@RTA_MULTIPATH={0xc, 0x9, {0x4e1}}]}, 0x28}}, 0x0) 07:21:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000290001"], 0x1c}}, 0x0) [ 902.446586][T24045] netlink: 116 bytes leftover after parsing attributes in process `syz-executor.4'. 07:21:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@ipv6_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x1}, [@RTA_PRIORITY={0x8, 0x6, 0x10000}]}, 0x24}}, 0x0) 07:21:34 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/ipc\x00') setns(r0, 0x0) setns(r0, 0x0) 07:21:36 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x118, 0x118, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x13b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:21:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c0000001800010000000000000000000a01"], 0x1c}}, 0x0) 07:21:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@ipv4_newrule={0x34, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_SUPPRESS_IFGROUP={0x8}, @FRA_GENERIC_POLICY=@FRA_PRIORITY={0x8}, @FRA_GENERIC_POLICY=@FRA_SUPPRESS_PREFIXLEN={0x8}]}, 0x34}}, 0x0) 07:21:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="380000004800010000000000000000000a000000", @ANYRES32=0x0, @ANYBLOB="000000001400010000000000000000000000000000000041080002"], 0x38}}, 0x0) 07:21:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@ipv4_getrule={0x1c, 0x22, 0x101}, 0x1c}}, 0x0) 07:21:36 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') setns(r0, 0x0) 07:21:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c000000110001"], 0x1c}}, 0x0) 07:21:37 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@ipv6_newaddrlabel={0x38, 0x48, 0x1, 0x0, 0x0, {0xa, 0x0, 0x80}, [@IFAL_LABEL={0x8}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}]}, 0x38}}, 0x0) 07:21:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv6_newroute={0x1c, 0x18, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x1c}}, 0x0) 07:21:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@ipv6_newaddrlabel={0x38, 0x48, 0x1, 0x0, 0x0, {}, [@IFAL_LABEL={0x8}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}]}, 0x38}}, 0x0) 07:21:37 executing program 5: getgroups(0x1, &(0x7f00000000c0)=[0x0]) 07:21:37 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) accept(r0, 0x0, &(0x7f0000000100)) [ 905.653151][T24088] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 905.662390][T24088] IPv6: NLM_F_CREATE should be set when creating new route 07:21:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc0, 0xc0, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xe3}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:21:39 executing program 3: open(&(0x7f0000000040)='./file0\x00', 0x54240, 0x0) 07:21:39 executing program 4: pselect6(0x40, &(0x7f0000000700), 0x0, 0x0, &(0x7f0000003380), 0x0) 07:21:39 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000002900)='/dev/zero\x00', 0x0, 0x0) 07:21:39 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000000840)=[{&(0x7f00000006c0)="b1", 0x1, 0x7fff}, {&(0x7f0000000700)='z', 0x1}], 0x0, 0x0) 07:21:39 executing program 1: clock_gettime(0x0, &(0x7f0000003340)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000003380)={0x0, r0+60000000}, &(0x7f0000003400)={&(0x7f00000033c0), 0x8}) [ 908.513533][T24112] loop5: detected capacity change from 0 to 127 07:21:40 executing program 4: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000840), 0x0, 0x0) 07:21:40 executing program 3: recvfrom(0xffffffffffffffff, 0x0, 0xffffffffffffff9d, 0x0, 0x0, 0x0) 07:21:40 executing program 0: setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 07:21:40 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001380)='pids.events\x00', 0x0, 0x0) [ 908.635214][T24112] loop5: detected capacity change from 0 to 127 07:21:40 executing program 5: io_setup(0x6, &(0x7f0000000040)) 07:21:40 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/schedstat\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000002100)={0x2020}, 0x2020) 07:21:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc0, 0xc0, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xe3}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:21:43 executing program 3: io_setup(0x8, &(0x7f0000000000)) io_setup(0x3, &(0x7f0000002380)) 07:21:43 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001b80)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2, 0x7f}, 0x1c, 0x0}}], 0x1, 0x0) 07:21:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000009380)=[{{&(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x20000000) 07:21:43 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$link(0x8, r0, 0xfffffffffffffffc) 07:21:43 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000040)) sched_getparam(0x0, &(0x7f0000000080)) 07:21:43 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/schedstat\x00', 0x0, 0x0) write$FUSE_INIT(r0, 0x0, 0x0) 07:21:43 executing program 4: select(0x40, &(0x7f0000000000)={0x7}, 0x0, 0x0, &(0x7f0000000140)={0x77359400}) 07:21:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x4, 0x4) 07:21:43 executing program 5: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dri/renderD128\x00', 0x22280, 0x0) 07:21:43 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{&(0x7f00000007c0)={0xa, 0x4e22, 0x0, @mcast2}, 0x1c, &(0x7f00000009c0)=[{&(0x7f0000000e80)="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", 0x5a5}], 0x1, &(0x7f0000000a40)=[@hopopts_2292={{0x18}}], 0x18}}], 0x1, 0x0) 07:21:43 executing program 1: futex(0x0, 0x8b, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000100), 0x0) 07:21:46 executing program 4: futex(0x0, 0x1, 0x0, &(0x7f0000000300), 0x0, 0x0) 07:21:46 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="d9", 0x1}], 0x0, &(0x7f0000000400)={[{@journal_ioprio={'journal_ioprio'}}, {@barrier='barrier'}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, '].'}}, {@fowner_gt={'fowner>'}}, {@fowner_gt={'fowner>', 0xee00}}, {@fsname={'fsname'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner'}}]}) 07:21:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc0, 0xc0, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xe3}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:21:46 executing program 5: futex(&(0x7f0000000000)=0x2, 0x9, 0x2, &(0x7f0000000040), 0x0, 0x2) 07:21:46 executing program 3: keyctl$search(0xa, 0x0, &(0x7f0000000700)='rxrpc_s\x00', 0x0, 0xfffffffffffffffe) 07:21:46 executing program 1: getitimer(0xa86e8fade56e48d3, &(0x7f00000001c0)) 07:21:46 executing program 3: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$update(0x2, r0, 0x0, 0x0) 07:21:46 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000080)="a9", 0x1, 0x2}], 0x0, 0x0) 07:21:46 executing program 4: clock_gettime(0x0, &(0x7f00000001c0)={0x0}) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000140)={0x3}, 0x0, &(0x7f0000000200)={r0}, 0x0) 07:21:46 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) 07:21:46 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, [], 0x0, 0x0}}}) 07:21:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, &(0x7f0000003c40)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000000)="510d52637ef0bbed5fac7020434d7c", 0xf}, {&(0x7f00000000c0)='C', 0x1}], 0x2, &(0x7f0000000400)=[{0x28, 0x0, 0x0, "6a7d731cc11ab8ba9d1da1349997ba5d0b"}], 0x28}}, {{&(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x80, 0x0, 0x0, &(0x7f0000002980)=[{0x10}, {0x10}], 0x20}}], 0x2, 0x0) 07:21:46 executing program 3: io_setup(0x80, &(0x7f0000002280)=0x0) io_submit(r0, 0x1, &(0x7f0000002240)=[&(0x7f0000002200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 07:21:46 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000001200)=[{0x0}, {&(0x7f0000001080), 0x0, 0xadd9}]) 07:21:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:21:49 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000001b40), 0x4) 07:21:49 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="d9", 0x1, 0x40}], 0x0, 0x0) 07:21:49 executing program 0: syz_mount_image$fuse(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuseblk\x00', 0xc, &(0x7f0000004380)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 07:21:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001580)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001700)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="210000000000000000003a000000080003", @ANYRES32=0x0], 0x2c}}, 0x0) 07:21:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, &(0x7f0000003c40)=[{{0x0, 0x0, &(0x7f0000000380)=[{0x0}, {&(0x7f00000000c0)='C', 0x1}], 0x2, &(0x7f0000000400)=[{0x28, 0x0, 0x0, "6a7d731cc11ab8ba9d1da1349997ba5d0b"}], 0x28}}], 0x1, 0x0) 07:21:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10, 0x0}, 0x30008845) [ 917.955742][T24255] fuseblk: Bad value for 'fd' [ 917.966922][T24259] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 917.995483][T24261] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 07:21:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001580)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_START_SCHED_SCAN(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000400)='nl80211\x00', r0) syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0)='ethtool\x00', r0) 07:21:49 executing program 1: perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:21:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xa) syz_genetlink_get_family_id$gtp(&(0x7f0000000240)='gtp\x00', r0) 07:21:49 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000003b40)=0x3, 0x4) 07:21:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @loopback}, @nfc, @xdp}) 07:21:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x1, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:21:49 executing program 3: add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 07:21:49 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000080)) 07:21:49 executing program 1: sigaltstack(&(0x7f0000ffc000/0x4000)=nil, 0x0) mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000040)=""/214) 07:21:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000900)=ANY=[@ANYBLOB="a400000074021b"], 0xa4}}, 0x0) 07:21:50 executing program 3: syz_mount_image$fuse(&(0x7f0000000280)='fuse\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x91444, &(0x7f0000000800)=ANY=[]) 07:21:50 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(0x0, r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 07:21:50 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) select(0x40, &(0x7f0000000000)={0x9}, 0x0, 0x0, 0x0) 07:21:50 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000500)='logon\x00', &(0x7f0000000540)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f0000000580)={0x0, "c85c37564dcfac0747baeaa147bf615c78b948c69c5cf3f1d47cd6b3d86e9711b0b29577e19b58f0a3385e76533bd96cb7eb6c2fc6c8c96b12c557ec3e1289a2"}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f0000000500)='logon\x00', &(0x7f0000000540)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f0000000580)={0x0, "c85c37564dcfac0747baeaa147bf615c78b948c69c5cf3f1d47cd6b3d86e9711b0b29577e19b58f0a3385e76533bd96cb7eb6c2fc6c8c96b12c557ec3e1289a2"}, 0x48, 0xfffffffffffffffb) keyctl$revoke(0x3, r1) request_key(&(0x7f0000000180)='rxrpc\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, r0) 07:21:50 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x308801, 0x0) select(0x40, &(0x7f0000000040)={0x9}, 0x0, 0x0, &(0x7f0000000100)={0x77359400}) 07:21:50 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000e40)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_STATFS(r0, &(0x7f00000001c0)={0x60}, 0xfffffffffffffdca) 07:21:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000002e40)={0x1ec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1310, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xbc, 0x3, 0x0, 0x1, [{0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, ':!\x92\x9c*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ':&\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '@[)\'\\Q\xec{()#\x00'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '%^}\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '(\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '$&\x06\x00'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '[:(,/!\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '.#\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_MASK={0x1001, 0x5, "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"}, @ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '\'!![\x00'}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'p^[\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '(\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%:]/-/,\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '*:\x00'}]}]}, @ETHTOOL_A_BITSET_BITS={0x168, 0x3, 0x0, 0x1, [{0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '&\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '^#![-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\\\'%\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\xbb,\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xe6\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x20, 0x2, '^\xd5&:*.^@*:[\\\xa8/(/*/+^\\))F+\xc4(\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '#$\xfc$#]\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '\'}(\\\\/\xca@\x8b*-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x12, 0x2, '[{#-\\%]}%&@-(\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '^!}\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(%\x00'}]}]}, @ETHTOOL_A_BITSET_BITS={0x6c, 0x3, 0x0, 0x1, [{0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '+-*[,]$\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '*%]\\\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '-&\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x24, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x19, 0x5, "9a6ed43bb6f430b8a1cb6b55a5b0a2576bb6d25dfc"}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x3a8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_BITS={0xf4, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '[^,!&/:\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '*\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '))$(\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '%\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/+:^@@$\\{\xce#\a}Q!@\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ')\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '#\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '+/\\%\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0xb1, 0x5, "8dc98c15b8dde0651f5e28359fee8f13da2ba9d082c18caba4332445017b97918dda0d715d3107a5780d29206ed9c7a5696d6cef9d8603ca28ad40380557e7c53dc79b7e39026ded79868057674ed11f8f6693eb74ddb88d4969a3ed4fe5ba693e188f0dde792fcabaae168a52ea1c6fb19a9f72068f2ecc7d6002fda479bff3b61169d961b72a2286a554aa4b3495781bc5887e8a8ef80d2bdd09245862804151173184fbe185be9c0fc45b52"}, @ETHTOOL_A_BITSET_BITS={0x5c, 0x3, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'I\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_MASK={0x95, 0x5, "a3eb2c91279a00a1267189cd0f52bac78d412bd2eef54e2c2718f789037b517cef35927d50a88a8457627c3e0aac62e2da9fb114b48d05ebc9a93e53b28511edb668b06450cb54c2ccd4e14ad61085bb37520743e0be2e9f2cfe304c5cefb63e129b6d02de21bbd0d70aac6181ef4eb712fe2ee870ef9de9884abd897f8ede9613db1033bd6c61105850c3bb472d507908"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0xf1, 0x5, "6e3c9a237890b3af071c03861e3393ba4a8545f154b3c2c0309cb0cf200c46e5e67767866f3323e4fe8a260bbb887d598e2d5a4c86ee7b34aa41765b79f682430a3ab7e6e84216430c3d2838aae0774fe2039f8b7ff4e919460f03b35e0d0e327a6684b8332766cffa02c44d72fb2a0f1599be08908a4178be3bc448e0f1c91bcd12d24adc3f5592ce25fe7b1bc610ab2b7cff1f9308866ae977c0a473aa9af1f6b5cb5be5364e92966edc6298b401a87e4442bdd5adfd5c6744e20a6b45e94c61a1bf74327d44316955ab718561479e0350620980172428be51902cb8e83e20d7a164c2d4e4cc5577d2b46076"}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x190, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, '%)/&H+$.%::.\x00'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '&.!{#:*\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '/)\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_VALUE={0x49, 0x4, "a494aad66a58d64e23cdf011f25d250c778e8d73ae6a81a96b4a61deaeedd6de36d396cdb3b20a9c7c8b3a8f9bd81bcb18bf89b61950dacf96ffb52666e588bc2b01b0b644"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_MASK={0xad, 0x5, "ae047df4a95a645210c7e6a09a4f262c25b8aa1fe87eee43487f217a26614fbbbd0dc8cb058ae6f948d11082a1376b4c066c7b6cf86657e218b786df3892d7989840a5000f9c3ec452b3dea6ff57bfb3e3513231eb8d6993327c51f2c27521fb12c3f191c4f634f8d4f2a684bcfd1141b1c99b8ac44ce44f23e3bf112c36143cf3ae9e5fb4d540324803ba5999309a8a3da8b9a43b044ca59214b07a2b20fc821c8003cc815ffa27b6"}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0xfc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xc, 0x3, 0x0, 0x1, [{0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x95, 0x5, "39f2e32640d98a60d850eebf13789148ddfa75fd8209b2d2b661bc387585f34cdf0345730cc1ce8be49b4f9e6c6604dc17bf1be7303b70446e8cf169f1c5f648c7c81ad318b6f17f643028f235e64955cbe9b45766eaf0fd58a7444ae1687178aba72c869ff91c8b23249f8a623f9dbaeb5cc8bd6a10d595d7ade8ecfd577ff7409e7b31246e9a0383ad7560eacf1706bd"}, @ETHTOOL_A_BITSET_VALUE={0x51, 0x4, "5bbc8d2b2e05beade59afd9aa483580d4391d9547ebfed3eb0287143b8cdbc4b971cadc6713e255f384b5cfaeb0186ee96d98459271c897513b42281c577f5d483380e67764387af03363c3a51"}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x4ac, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_VALUE={0x49d, 0x4, "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"}]}]}, 0x1ec4}}, 0x0) 07:21:52 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:21:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0xff}]}) 07:21:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'erspan0\x00', 0x0}) 07:21:52 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00'}, 0x1c, 0x0, 0x0, &(0x7f0000000480)=[@flowinfo={{0x14, 0x29, 0xb, 0x5}}], 0x18}}], 0x1, 0x0) 07:21:52 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{&(0x7f00000007c0)={0xa, 0x4e22, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0) 07:21:52 executing program 4: perf_event_open$cgroup(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:21:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x66, 0x0, &(0x7f00000000c0)) 07:21:53 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) 07:21:53 executing program 1: socketpair(0x11, 0xa, 0x8, &(0x7f0000000540)) 07:21:53 executing program 3: perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:21:53 executing program 5: clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000140)={0x3}, 0x0, &(0x7f0000000200)={0x0, r0+10000000}, 0x0) 07:21:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2020484, &(0x7f0000000400)) 07:21:56 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:21:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000180), 0x4) 07:21:56 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "92c95ddfc510c270f0d3a0271f609ef6d6caf09e0bdf09c0fcdc1df43aa3ceb4c7ea28b7627ccba96af4302b9bf484ee33e1a2eeae4d6554b0d111738c2d3321"}, 0x48, r0) 07:21:56 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00'}, 0x1c, 0x0, 0x0, &(0x7f0000000480)=[@dstopts_2292={{0x18}}, @flowinfo={{0x14}}, @dstopts_2292={{0x18}}], 0x48}}], 0x1, 0x0) 07:21:56 executing program 5: syz_mount_image$fuse(&(0x7f0000000040)='fuse\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id'}}) 07:21:56 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x204400, 0x0) 07:21:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000004ac0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000040, 0x0) [ 924.625315][T24370] fuse: Bad value for 'fd' 07:21:56 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000002c0)) 07:21:56 executing program 4: perf_event_open(&(0x7f00000025c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:21:56 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/tty/drivers\x00', 0x0, 0x0) [ 924.673384][T24370] fuse: Bad value for 'fd' 07:21:56 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000097c0)={'sit0\x00', &(0x7f0000009740)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @empty}}) 07:21:56 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001580)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001700)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB='!\x00\x00\x00\x00\x00\x00\x00\x00\x00:\x00\x00\x00\b\x00', @ANYRES32=0x0, @ANYBLOB="0c00990000000000000074c523"], 0x2c}}, 0x0) [ 925.050489][T24387] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 925.063031][T24388] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 07:21:59 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x6, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:21:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f00000008c0)={[{@noacl='noacl'}]}) 07:21:59 executing program 3: munmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000) mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) 07:21:59 executing program 1: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) 07:21:59 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/schedstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) 07:21:59 executing program 0: getrusage(0x0, &(0x7f0000000000)) clock_getres(0x0, &(0x7f0000008740)) 07:21:59 executing program 1: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001580)='nl80211\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r0, 0x1, 0x0, 0x0, {{}, {@void, @val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) [ 927.722666][T24404] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:21:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f00000005c0)={&(0x7f0000000400), 0xc, &(0x7f0000000580)={&(0x7f0000000940)={0x4c, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0x3c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_TUN_PORT={0x6}, @IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_TUN_PORT={0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_INACT_CONNS={0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'macsec0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}]}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'netdevsim0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}]}]}, 0x10c}}, 0x0) 07:21:59 executing program 3: perf_event_open$cgroup(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:21:59 executing program 1: io_setup(0x50, &(0x7f0000000000)=0x0) io_destroy(r0) 07:21:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:21:59 executing program 0: syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)=' ', 0x1}], 0x0, &(0x7f0000000140)={[{'^$'}, {',@-\\'}, {}, {'-@'}], [{@fowner_gt={'fowner>'}}]}) [ 928.128493][T24404] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 928.254334][T24432] nfs4: Unknown parameter '^$' [ 928.323249][T24432] nfs4: Unknown parameter '^$' 07:22:02 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x9, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:22:02 executing program 3: getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f0000000040)) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 07:22:02 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) select(0x40, &(0x7f0000000000)={0x9}, 0x0, 0x0, 0x0) 07:22:02 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000001500)={&(0x7f0000000040)={0x2, 0x4e20}, 0x10, 0x0}, 0x0) 07:22:02 executing program 1: select(0x40, &(0x7f0000000080), &(0x7f00000000c0)={0x6}, 0x0, 0x0) 07:22:02 executing program 0: openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 07:22:02 executing program 4: socket(0x10, 0x803, 0x0) 07:22:02 executing program 1: msync(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x6) 07:22:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x4100, &(0x7f0000000400)) 07:22:02 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f0000002dc0), 0x0, 0x0) 07:22:02 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000400)='ns/uts\x00') 07:22:02 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x16, 0x4) [ 931.390147][ T3251] ieee802154 phy0 wpan0: encryption failed: -22 [ 931.396819][ T3251] ieee802154 phy1 wpan1: encryption failed: -22 07:22:05 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x114, 0x114, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x137}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:22:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000005400)={0x77359400}) 07:22:05 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000002800)='/proc/partitions\x00', 0x0, 0x0) 07:22:05 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000003040)=[{{&(0x7f00000007c0)={0xa, 0x4e22, 0x0, @mcast2}, 0x1c, &(0x7f00000009c0)=[{&(0x7f0000000e80)="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", 0xb27}, {&(0x7f0000000940)="7114", 0x2}], 0x2, &(0x7f0000000a40)=[@hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x1, [], [@generic={0x0, 0x6, "8eb90a3f45c3"}]}}}], 0x20}}], 0x1, 0x0) 07:22:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000180)={[{@fat=@umask={'umask'}}]}) 07:22:05 executing program 5: syz_mount_image$fuse(&(0x7f0000000480)='fuse\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read'}}, {@blksize={'blksize'}}]}}) 07:22:05 executing program 3: getgroups(0x1, &(0x7f0000006640)=[0x0]) [ 934.022105][T24498] fuse: Bad value for 'fd' [ 934.057972][T24498] fuse: Bad value for 'fd' [ 934.064754][T24501] FAT-fs (loop1): bogus number of reserved sectors [ 934.075861][T24501] FAT-fs (loop1): Can't find a valid FAT filesystem 07:22:05 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00*\x00'], 0x24}], 0x1}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe4, 0x0) 07:22:05 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/schedstat\x00', 0x0, 0x0) 07:22:05 executing program 3: select(0x40, &(0x7f0000000080), &(0x7f00000000c0)={0x7}, 0x0, 0x0) 07:22:05 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) 07:22:05 executing program 1: pselect6(0x40, &(0x7f0000000100), &(0x7f0000000140)={0x3}, 0x0, 0x0, 0x0) 07:22:08 executing program 0: syz_mount_image$fuse(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1101000, 0x0) 07:22:08 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{}]}) 07:22:08 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') rt_sigpending(0x0, 0x0) 07:22:08 executing program 1: mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) sigaltstack(&(0x7f0000ffb000/0x4000)=nil, 0x0) 07:22:08 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00*\x00'], 0x24}], 0x1}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe4, 0x0) 07:22:08 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x114, 0x114, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x137}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:22:08 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f00000069c0)={0x0, 0x0, &(0x7f0000006980)={&(0x7f00000068c0)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 07:22:08 executing program 4: add_key$fscrypt_v1(&(0x7f0000000500)='logon\x00', &(0x7f0000000540)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f0000000580)={0x0, "c85c37564dcfac0747baeaa147bf615c78b948c69c5cf3f1d47cd6b3d86e9711b0b29577e19b58f0a3385e76533bd96cb7eb6c2fc6c8c96b12c557ec3e1289a2"}, 0x48, 0xfffffffffffffffb) 07:22:08 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f00000022c0)='/proc/consoles\x00', 0x0, 0x0) 07:22:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000880)={&(0x7f00000007c0), 0xc, &(0x7f0000000840)={0x0}}, 0x48840) 07:22:08 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000500)='logon\x00', &(0x7f0000000540)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f0000000580)={0x0, "c85c37564dcfac0747baeaa147bf615c78b948c69c5cf3f1d47cd6b3d86e9711b0b29577e19b58f0a3385e76533bd96cb7eb6c2fc6c8c96b12c557ec3e1289a2"}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, &(0x7f0000000540)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f0000000580)={0x0, "c85c37564dcfac0747baeaa147bf615c78b948c69c5cf3f1d47cd6b3d86e9711b0b29577e19b58f0a3385e76533bd96cb7eb6c2fc6c8c96b12c557ec3e1289a2"}, 0x48, 0xfffffffffffffffb) keyctl$revoke(0x3, r1) add_key$fscrypt_v1(&(0x7f0000000400)='logon\x00', 0x0, 0x0, 0x0, r0) 07:22:08 executing program 4: setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, 0x0, 0xfffffffffffffe4c) 07:22:08 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 07:22:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x24, 0x464, 0x0, 0x0, 0x0, "86b6045bbdaab2fd82d0d7758b5e377fc4"}, 0x24}}, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000240)='gtp\x00', r0) 07:22:09 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x453, 0x0, 0x0, 0x0, "87", ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x22081}, 0x20000054) [ 937.597685][ T37] audit: type=1107 audit(1617952929.093:39): pid=24567 uid=0 auid=4294967295 ses=4294967295 subj==unconfined msg='‡' 07:22:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x114, 0x114, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x137}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:22:11 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE(r0, &(0x7f0000001200)={0x0, {'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000000)=""/243, 0xf3}}, 0x120) write$UHID_INPUT(r0, &(0x7f00000001c0)={0x8, {"e4fc2463c5f19fad3300e0495c9d9548b328a3e97b8cbb13e91f71108dd130570813f461c1466bbe76c0a9a40ffbfe79e513fe548071c8a1caff61f786987b7340aa4e08219e47fb7ead74565b4171008907500fa3116d226be36bccf735ed2f8dabac1e9d90d5a001f0fb282c0abb662a2da2b9f678bd570fdc3d1c97935d488b7d82bc0b2181d3e01c191c3605c2fd67a189d883744b89aa67cb2e80c5df97b1947b50393ebd6a33fca4983eee4a7d41d1df8fd3f9c0b11170c4cac2fe831f29c510626a9632becd78ebd75e2e1474a2b3cfd895215c66d91365df3976f0dcba3bcaa723166ced39496c102e950c02b0a3bd9a91ba9d3cc8116770ec0dcc219639d68d1b3902678992fc27595963959b1b5c6707c74e3f0ac6078da5fe47e0104a57fd4f2949d9b3c0726e60958873a6a2fe7822d893a835d798661ea28506b02e2ff05e177bee89b8fa952056e3365c35e23520222899b4ce72193f2630cfe59d41c7f7e5e3460063720ba1145608f8c2f0f851f4929e314237db7f68bbc06fe3260db637cc70b30d44e430a14ddf0001e5d9c414acb32f142f154e91d42ba70259f7d05f59aa92221c0586a7414dac6422f3e851a4cf28715968bc0009249e49558e99e9aa413b71931a66f5ea6107e0824d93fe9adccec4a8c87fe8c16f75535eea2d7172e70eebf1fcb7eacb8702cf628c56cd4f12a39ed8bfcd905eb16f0202a24ccd42a549d86edc690e74b7f2935d806db7b2a0f459a5c6efd99225a68559ada52b647b8eac6dd0ab551993b59c1ae82d42f90ecd9e52096c9aded3ebb0a8f90883acc2b68f18431e63fc21f1c989a88bb127960a8426b428e14dc7328099a826bfd05c9a9517ceb6d46fe4f78987bc53b3f8cc66727400ddd16b5f1cec24b23fbdb3085edbe747d67de1a1d36e37a67e7fd8976f1404ca7dab158e894f0907780c102a61a36b8b57bf925d32f711fc093d82c48efeee133b73d7cff95983c084bef2a6c0249986727766335241034b065741ba1e788d2badc43d76df899c8d6e15d27af8e7e1dece41e62811fe2ce25e78fa1c4fda1971c197827c1c7e209ccb1438830f483716ae180ea0834f92d69c0d7e53150da331daed2e9d7c02f6c717a0768018df3003f5044d34d8755eefce02923d8ef38ca7469b32d3ce7f443dff9a2f33583aaf819e799c8f77a84a3ab4a6bf74d41dff0550ea84935bc856a5e18d18b12907ab7f0e8c76e9e38fe8a07074feda23a122bcccfeb5802f4e87d6e69c8dac8cd8e1d495664411011a65468bd265e8e0f74106e95b8492cf025f95bdfa6d614f6aaa252060e171c36c84292aa0a5c4f9d3bdaab1888e77fb74bf09e2ec84832800098f28917ccf91ea52d5b4165c24e9f7ff19ef2e37d616784eba82d2c7f4c8625dbecdfba43e77c56361a21ac8018f28fd2f6fa26d8d2b6af6fc42b8228d3f6cdfa01803e42fe03e7109ee6fe460f469b0f317b73dadead8dd2bc0464eb9c5a9270a26c54e357dff5089c6b17c4445c1a8afecb774c38837608b6041eaa02880f04492112334a3300c9b0b4eacd3d130f97d12fd2b0c917a4a9707f64b084d43f96814c4a27726b849c45d942e0c0acece9b59a0b11c6f3d3c8dccd4f08c869071cd12e6916a1d4936b519e0ab5a4bdfe24e6e73392fc1aa146dc937951b77f83a6069e57d765b58aaea46e59178e6761fd2066e2814f25c15aae8fafc3f5910a1747f216c8500823012bcdab9eaf59c01e76193f098bcb59c9192681fbbffd03ed697d1cf0b444d1fcd395b693709cc2dda6ae38a2e8d81ccdb6db24529a5fab354ef0100a0853c67ff3ac47db08b2e801a14f0d2de8864fef6c7e116a4858eef236b7dea8feeee23e38301016d3253d5d5ce643b2dbe1a8cbe9f992c752c269f76f0d2df85c1b419be045b5e3a7a42f1b2db158d3fb2c3cdd7b043d1bc1b0947a795209eae5b2350e6a4864a6116f174d45642621e7a1c806065d31546eb3ad2c49fa7d58992cd2d0b905e117f801337b76944b95fe96186354f48130494fa6081c70b02b0d70ce4c81389ac693977fe8a4aed79d83fb2fe8c785e96ba7f92f52d5e7c570ca3dafd851fe7d51fe07ccd6e7234a19bd4885917af4a8746c3d770964da6a5f2b321fb2763f850ffb241d627321b639e0da3e3ddc7a7bdb9a1b4f24e3b4c544d9a11aaf77b12763efd62a565dc7e79fb14444649ecbf48a5b195bea8ac91c064c8db39b30c2305ff9b85a7de52a35301083da8a6b54bf6c9d09011a3d173a2b3f3217c2fd9679abc9d29560f195e600aefb8b15b7627e99da65ae30ab6bf446e7e24cdbb4794a4c625ccfd5e5ed3cd8887384f112df3400f0b3efb9a99a477e01dcaa64712e1175a0793e9be7b136a5dc1f2598e4c7afe3aff7057cac98c785c90f6fd9184fc1ce5358e77727ef317942b22a3ecbe5f92f9ac32e0124fed649f9188775b21a66ba1894d2d4fce1099c749df68c9590f745cb0524adf54039ebee50a3d72f75ba4d226a525df0a87d6679cc78fc55ff913c7f8eca13f0daf92bff7b88e2ac2581fa32fc087f9bc636047aab0bb93f17852d04f9fd7258649037a7e45570224a6a93e41b27c1f3b9c2a7c19646ccc1b2bde05cfda5b3eb021ae984f270ae2021f820096fd6a7b865ba13034bffde9e11f9140b7517d451019fee54757b8eb20f3d774cb2674f8fa889ecdd27d1a949c5d38295415f068dc4962bc76ab1bd2132e607362e113cafed5d236fbaa8945e03e564381a70ada915a992c11dab15ee9aab4797cf02332df56cc2b205dcdadd556b837ee7c360d931ca172b87c09487208c1a8eb20063654b20bdfbc12e9dc2f36ed56db5b11cdf7a39a2b9576ebf8276b8ff46fe80ab3230e6288206b408cbb0a6039cc8627ecea0d38ae73808fa34f0b624c3ff677ec2c8688d171f545068959139f3525ede676146f0321a735da7bc798324c1c0e495a28e5d702d85c074cabed6d15b249cac5e18fdd9e158cd0c46c2b9146a6028e5913bfbb3b3204d18abfd924b4884ba5c7daa93b41dfb778fc585d8fa35cb65ac48a1512298da0a4ab6899890a89ce2089baed66a80c3127b8a15cd3aefbf4420b304a6bf91f52d11e09f730037484e53da188c55877d963ad7bfaf46dd7b62438f16589e4c2362885d3485ad360fbd9f224c54b50ee191441791cdd04ebdb95e161a528ab078d363bb318cde6e6bba0dbcc9229a96359fbbd4790f5eac51a8ce161015b1dee04377326a58e65c6b2d3409c6bf37e1efdc588d7f095c844f9a5df01a163d0176c4d03e1050f7f1f08c7d991261a5ae95166acf4fa9cec6374bcf60fdbb9e38a718feaef23488496fc634df8e7cae23f4a5462f17e13133a9153519b482ba42edbebc9d834237ee8e50f3debd3b774c95cc72aaa6308e43c810809272254ebfd73a8f04f28ad2e7a823da4c70494578090c54b55a7da3c87a90abdb33706cb15d84d5397a72cae0a3aa463b9c89a92030254f1a00a8d2d6def0a41ded1bd855561bb823fbbb245ea1dc73d37d6ade09dae561c5d4714804758f66290f198c96a82b5727aa271f2f454b7de441d1cd4c6daa0659b267aaefab1ba75ad038dd333a9393a148b119cf5a0abe77a8e1336cf4deee2289f217f88f8912a0dc88c504ccbd21b400fde12fe528cc2817459dfd95fdf56c58af03086555d79e571e32c43c5809d994bd6f8fe306b5f903a702fce8299fa79e492318e4a2071b081073623cc065fc22b4b9a3a277c60894abcab33d12af62c257319f6d41296c6bd44acb9d0e6213d49982dd222f81c792b43fc21d8ef6f888174c93cc4dc65899f066cb487dd7138c2bc8d85516feb4c90d51c58e59db97e28edd2b09894b8237503cc97d58d13cac4bf167913b7e5ea1a129d3cce5e13e0ce5e0ffc45e1515349ff3a804159bfb5e7529e4f68e2b04ff79aa4fa913b57cf4e516de6375fe729af163c2698f9aa5ccc2aef33e0ee5bfe735b04ad9656b43409f8e95219d99c4d0372d66cf7d2c12b8372817a61ebb5ef58187a69610d4b381e13caed9333ed67aa1f616c109b926e9271d6eb26302a0c0e1b46853e83c72e8e369c128b12cd61eb585f3406f6bf9f084a58e3628abddda3002534e854dd4f58f39093df077d02ec1ad31881d50cfb3ba49222bdaea4bde0172dfe207cda1cd936fca28e1807f8320fcd6db0c2df92d1060bc6a011d54c548246b709eacfef4cd5f61ed9a30b33783504f743af75eda1a6d5b8bfd6808bdae9cd295fff3876d2a9fb98811ddf073e061011e5bead3b8dfdd99139e9a955e8a180cb468dae669023d947592695e856c2b07d47e5d2fefbfc5ba78b9a19afc341193f7a8999b4eafa98de3d21cd2cbcf9b16668189570e74ee30719571072fae30f84c31330093f04bada70c37ba7882182fd1fd388eeaa11081ea472770b847ee63c0d7536b9e9416c88a59cde2d99e14eefbe799753402b2b3cbd728c5b742227ad22e91e5fc187d251758c978569f44df1060395ec2e6af2e220a288f25cccf433f7d89a97ec6b2ae880379315a00c5bf37fbd1626f3d1352c0eeea8416962de5006ab3cc325039555e612c156548aa513bd68adfa3ae6101e9a3a2c55ef2368d5223adb9a60bb9caaca569c3dd087a39d0f803c810f007c1d909e960b4b3a27e80055472fb0573a9d6d9f73495c555508a8b7c571231da92bb7447326be721b951a0163fbecceacf43b43be8eb390d9efcc8e535e730073ab96230be73f5a357fc47cf964cef64b28e86aab5a72356451de83c8175bde5323bc211372422c1c143877a2d64017f83f7e8c9c2621c0a47e35b7d203e3d8744c76009b52899e8fe54673ada04b297e44155ac090ce4a8f1e7fe314a1d14301343d2b7cf09de45daeff523cb400f85886160e0a3312be3805ce8a462c08c3575119aa43a230e791997647eba55c8fe4c03fdb4f949ac996e447c64a440d7ee6f8e0a3ef65577abe8d689bb805eeca7af025183d1970c33ceaab2e36163ff3dd5a596f137c54fe86c31aea9d16b80ba20a359797c91a18a8d8abdfe81936bc1ddaae42ebc7cba30c5ef278a61246193b82cec278eb5bc26a5e4590ee05a1c2866ccabbce997881ba38ee040526076e99f5c8752b4aed4f6b1b3e71b88661a887851292c093fbf200aade8dea583b3526ac4a52096935f2aa64f90b769ed29bbf83da973b60683bff1f08cf6cbcfd7bb7b26d442d574b3b04f7fedce395ef2e30979c26ccba74decf5231b0ec54a58c1d72f8b8d3041220e17d828741e6c50817fcf98d198eb1f8fb457a0544306e744bfceef8d8dd847fd750120e9a2bd087cba133cb37c3b7c276b8ce65250ccce0d05c8477285959a46bc591fd88e670e0ad9b92ae0b99e564f734c245c522826adb5e91ed84b489b0f10581311090e8ed38b1f9ded9002bf969af84e7a30d1ccb1103ec7099405270b6cac7a072e1f85637d6bdfb18680fc4988c99202b4ec03e6d51c266f99f211b1fcab92b861427838c29935f81768515376c7086a068dd9b45f52485db1ce851fba962a4fe0d75e460ddf1bd79c8db5088c5655d06636c7e90fbc69826eff1412accad5b2edfbd70274dd5792b6cb281bac873f740b28b3b57190247803fefd930add6fac74832f9b0da930b2b16312e351af5245d81febe48968995b43b4f567630fd4d082808e2c1c1fd894a617b13641ec4c0afe5554fcce1fbf35c050e46e1f69ce207f74fcd140d880068c63eb7536a18ceb288dfc867c3aa9ce11d581e", 0x1000}}, 0x1006) 07:22:11 executing program 1: syz_open_dev$vcsn(&(0x7f0000002900)='/dev/vcs#\x00', 0x2, 0x20440) 07:22:11 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) clock_getres(0x0, 0x0) 07:22:11 executing program 0: getrusage(0x1, &(0x7f0000000040)) 07:22:11 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00*\x00'], 0x24}], 0x1}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe4, 0x0) 07:22:11 executing program 1: add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1) [ 940.250451][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 07:22:11 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) bind(r0, &(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, 0x80) [ 940.297299][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 07:22:11 executing program 3: syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', 0x0, 0x0, 0x2, &(0x7f0000001240)=[{&(0x7f00000000c0)="d0d3448a49885ac2fcf7d67ac0c7669dfc982de92c062e3bfc1eac2b38f0495f9ec77e9b52739d5fd5f2c3ffb8e0cd62440840b22c09601262851b491e477b5a4780fbb64ff5b4c6f7441e01c51169201abb847182d51f21e0cf120c305d0d3cff609c0980401f199b4a263de4e8feb5e6c01f71e31a6ee98054a29b268ec12b94910d441a620e19", 0x88, 0xf79}, {&(0x7f0000001200)='&', 0x1, 0x80000000}], 0x0, &(0x7f00000033c0)) [ 940.345282][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 940.383524][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 940.397623][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 940.423214][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 07:22:11 executing program 1: clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000100), 0x0, &(0x7f0000000180)={0x2}, &(0x7f0000000200)={0x0, r0+10000000}, 0x0) [ 940.449024][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 940.469962][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 940.487120][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 940.503908][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 940.514058][T24600] loop3: detected capacity change from 0 to 264192 [ 940.553067][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 940.576665][T24600] loop3: detected capacity change from 0 to 264192 07:22:12 executing program 3: add_key$user(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) setfsuid(0x0) [ 940.603087][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 940.666079][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 940.706255][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 07:22:12 executing program 1: add_key$user(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000180)="8e", 0x1, 0xfffffffffffffffd) [ 940.747455][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 940.799182][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 940.836169][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 940.868566][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 940.886698][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 940.904100][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 940.931259][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 940.960207][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 940.989102][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 940.999162][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.006817][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.014712][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.022584][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.031749][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.041180][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.084132][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.121212][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.133769][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.141868][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.158243][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.170937][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.178489][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.192454][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.204552][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.216807][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.229119][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.236666][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.253142][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.266315][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.310119][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.333895][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.353284][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.384445][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.396641][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.408362][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.420485][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.428049][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.441236][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.455216][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.465663][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.478756][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.486458][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.498869][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.506421][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.514239][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.522066][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.529779][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.537493][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.547789][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.566707][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.581071][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.594493][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.605113][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.618043][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.630886][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.638491][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.648914][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.656515][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.665471][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.673167][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.680824][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.688477][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.696157][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.703924][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.711656][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.720538][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.738980][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.746544][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.768907][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.776873][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.784438][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.792036][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.799601][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.807022][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.814651][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.822213][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.829698][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.837113][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.845523][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.856908][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.865854][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.873469][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.881051][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.888502][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.896010][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.903585][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.911129][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.918542][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.926142][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.933679][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.941294][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.948796][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.956259][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.967834][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.983675][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 941.993984][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.006671][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.016881][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.032698][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.044329][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.055927][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.068959][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.076534][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.087983][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.099386][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.106831][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.122477][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.134396][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.145833][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.157397][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.169159][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.178175][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.192494][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.203931][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.215446][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.226995][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.238547][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.250509][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.257940][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.270967][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.285852][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.296119][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.309021][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.316495][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.330756][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.338212][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.351571][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.363100][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.376481][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.388217][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.399914][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.407353][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.421616][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.435992][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.447436][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.459039][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.466500][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.483178][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.493819][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.506705][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.516924][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.529937][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.537358][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.551612][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.563029][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.574551][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.590545][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.597988][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.610957][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.618378][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.631284][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.644085][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.654304][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.667114][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.677300][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.692262][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.703912][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.715411][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.726851][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.738418][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.756664][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.768170][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.779704][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.795739][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.804477][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.825208][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.839541][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.846995][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.861146][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.868581][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.881484][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.894912][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.913005][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.924655][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.936162][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.947637][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.959219][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.966623][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.980763][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 942.988176][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.006066][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.015114][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.030820][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.038230][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.051095][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.058506][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.071483][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.083005][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.096348][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.107873][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.119445][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.126850][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.141351][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.154391][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.164558][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.177602][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.187790][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.202615][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.214153][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.226660][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.238158][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.249873][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.257286][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.278866][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 07:22:14 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000600)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80) [ 943.286288][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.308234][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.324355][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.345819][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.365504][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.379022][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.401287][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.414934][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.422578][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.430182][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.437692][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.445351][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.453020][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.461372][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.476933][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.492454][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.508192][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.524999][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.540708][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.556186][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.571750][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.583907][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.608063][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.623753][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.641804][T22250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 943.672699][T22250] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz0 07:22:15 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/locks\x00', 0x0, 0x0) 07:22:15 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {0x0, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:22:15 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00*\x00'], 0x24}], 0x1}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe4, 0x0) 07:22:15 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000005c0)={@ipv4={[], [], @remote}}, 0x14) 07:22:15 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000001500)={&(0x7f0000000040)={0x2, 0x4e20}, 0x10, 0x0, 0x0, &(0x7f0000001480)=[@ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}], 0x38}, 0x4000084) 07:22:15 executing program 0: socketpair(0xa, 0x0, 0x293a1795, 0x0) 07:22:15 executing program 1: getrusage(0x0, &(0x7f0000002800)) 07:22:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001580)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001700)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB='!\x00\x00\x00\x00\x00\x00\x00\x00\x00:'], 0x2c}}, 0x0) 07:22:15 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000002a00)="d0", 0x1}, {&(0x7f0000002b00)="d3", 0x1, 0x100000001}, {&(0x7f0000002c00)="b1", 0x1}], 0x0, 0x0) 07:22:15 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000180)="a1", 0x1, 0x80000001}], 0x0, 0x0) [ 944.072139][T24650] loop0: detected capacity change from 0 to 264192 07:22:15 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x1) [ 944.118044][T24654] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 07:22:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x1, &(0x7f00000000c0)) 07:22:15 executing program 0: io_setup(0xb0f8, &(0x7f0000000040)) [ 944.206334][T24658] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 944.232597][T24659] loop3: detected capacity change from 0 to 264192 [ 944.330177][T24661] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 944.346366][T24659] loop3: detected capacity change from 0 to 264192 [ 944.404618][T24661] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 07:22:18 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[{0x0, 0xfffffffffffffec0}], 0x0, 0x0) 07:22:18 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x64a02, 0x0) 07:22:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={0x0, @qipcrtr, @xdp, @phonet, 0x2}) 07:22:18 executing program 1: request_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0) 07:22:18 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0xe, 0x4, 0x3}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:22:18 executing program 5: add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="e4", 0x1, 0xfffffffffffffffb) 07:22:18 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/shm\x00', 0x0, 0x0) read$usbmon(r0, 0x0, 0x0) 07:22:18 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001580)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001700)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB='!\x00\x00\x00\x00\x00\x00\x00\x00\x00:\x00\x00\x00\b'], 0x2c}}, 0x0) 07:22:18 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE(r0, &(0x7f0000000080)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000040)=""/2, 0x2}}, 0x120) 07:22:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCDELRT(r0, 0x890c, 0x0) 07:22:18 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f0000002dc0)=[{&(0x7f0000002a00)="d0", 0x1}, {&(0x7f0000002b00)="d3", 0x1, 0x100000001}], 0x0, 0x0) 07:22:18 executing program 5: syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000180)='ns/user\x00') [ 947.223909][T24708] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 947.271639][T24713] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 947.280148][T11529] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 947.306795][T24714] loop3: detected capacity change from 0 to 264192 [ 947.313065][T11529] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 07:22:18 executing program 0: clock_gettime(0x2, &(0x7f0000001940)) 07:22:18 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4000, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000000800000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, 0x0, 0x80100, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000200)='freezer.state\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000280)='net_prio.ifpriomap\x00', 0x2, 0x0) [ 947.354201][T11529] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz0] on syz0 [ 947.378289][T24714] loop3: detected capacity change from 0 to 264192 07:22:19 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcsu\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0x4020940d, &(0x7f00000001c0)={0x280000000000009, 0x0}) 07:22:19 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5401, 0x400000) 07:22:21 executing program 5: shmat(0x0, &(0x7f0000c00000/0x400000)=nil, 0x5000) 07:22:21 executing program 3: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, r0, 0x0) 07:22:21 executing program 4: r0 = shmget(0x1, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x5000) r1 = shmat(r0, &(0x7f0000fff000/0x1000)=nil, 0x5000) shmat(r0, &(0x7f0000ffc000/0x3000)=nil, 0x4000) shmdt(r1) 07:22:21 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x114, 0x114, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x137}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:22:21 executing program 0: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x78, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:22:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f44cf0783279a494c8e4eba955b16e77f57966d4ba7560f29500352543b498fccba20bcae2b6f577b36b79f72f77e153f55e4fa6ad43af0d450a8f2c60baa", 0xa3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 07:22:21 executing program 5: r0 = shmat(0x0, &(0x7f0000ff6000/0xa000)=nil, 0x125cdea6d2c1d2c7) shmdt(r0) 07:22:21 executing program 3: syz_usb_connect$cdc_ecm(0x0, 0x54, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x42, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@dmm={0x7}]}}}]}}]}}, 0x0) 07:22:21 executing program 0: syz_usb_connect$cdc_ecm(0x2, 0x4d, &(0x7f0000000140)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}) 07:22:21 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5424, 0x0) 07:22:21 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b", 0x2c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0xd) 07:22:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000a80)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={0x0}}, 0x0) 07:22:22 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5414, 0x401000) [ 950.578931][ T4840] usb 4-1: new high-speed USB device number 6 using dummy_hcd [ 950.629013][T11529] usb 1-1: new full-speed USB device number 2 using dummy_hcd 07:22:22 executing program 4: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0x40082404, 0x0) 07:22:22 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000100)={{}, 0x0, 0x0, 'id1\x00', 'timer1\x00'}) [ 950.820083][ T4840] usb 4-1: Using ep0 maxpacket: 8 [ 950.939358][ T4840] usb 4-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 951.089798][T11529] usb 1-1: unable to get BOS descriptor or descriptor too short [ 951.149377][ T4840] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 951.159231][ T4840] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 951.167353][ T4840] usb 4-1: Product: syz [ 951.173251][ T4840] usb 4-1: Manufacturer: syz [ 951.177863][ T4840] usb 4-1: SerialNumber: syz [ 951.229967][ T4840] cdc_ether: probe of 4-1:1.0 failed with error -22 [ 951.243876][T11529] usb 1-1: unable to read config index 0 descriptor/start: -71 [ 951.254538][T11529] usb 1-1: can't read configurations, error -71 [ 951.433640][ T4840] usb 4-1: USB disconnect, device number 6 [ 951.938819][T11529] usb 1-1: new full-speed USB device number 3 using dummy_hcd [ 952.238893][T10181] usb 4-1: new high-speed USB device number 7 using dummy_hcd [ 952.408905][T11529] usb 1-1: unable to get BOS descriptor or descriptor too short [ 952.528860][T10181] usb 4-1: Using ep0 maxpacket: 8 [ 952.569024][T11529] usb 1-1: unable to read config index 0 descriptor/start: -71 [ 952.585780][T11529] usb 1-1: can't read configurations, error -71 [ 952.595662][T11529] usb usb1-port1: attempt power cycle [ 952.659574][T10181] usb 4-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 952.899732][T10181] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 952.909147][T10181] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 952.917309][T10181] usb 4-1: Product: syz [ 952.925856][T10181] usb 4-1: Manufacturer: syz [ 952.931537][T10181] usb 4-1: SerialNumber: syz [ 953.000336][T10181] cdc_ether: probe of 4-1:1.0 failed with error -22 07:22:24 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x114, 0x114, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x137}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:22:24 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x540e, 0x0) 07:22:24 executing program 0: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttynull\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x402c542b, 0x400000) 07:22:24 executing program 1: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttynull\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x541e, 0x0) [ 953.209383][T10181] usb 4-1: USB disconnect, device number 7 07:22:24 executing program 3: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) waitid(0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 07:22:24 executing program 4: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0)=@secondary='builtin_and_secondary_trusted\x00') 07:22:24 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newsa={0xf0, 0x10, 0x1, 0x0, 0x0, {{@in=@multicast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in=@local, 0x0, 0x2b}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 07:22:24 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f44cf0783279a494c8e4eba955b16e77f57966d4ba7560f29500352543b498fccba20bcae2b6f577b36b79f72f77e153f55e4", 0x97}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 07:22:24 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0x40042409, 0x0) 07:22:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="030000000000000000006c00000008000300", @ANYRES32=r3], 0x24}}, 0x0) 07:22:25 executing program 0: perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10002, 0x72f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:22:25 executing program 4: syz_usb_connect$cdc_ecm(0x2, 0x4d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, 0x0) [ 953.698548][T24869] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 953.751797][T24874] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 954.038794][ T4840] usb 5-1: new full-speed USB device number 4 using dummy_hcd [ 954.408895][ T4840] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 954.578949][ T4840] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 954.594799][ T4840] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 954.604026][ T4840] usb 5-1: Product: syz [ 954.608224][ T4840] usb 5-1: Manufacturer: syz [ 954.618957][ T4840] usb 5-1: SerialNumber: syz [ 954.663254][ T4840] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 954.864208][ T8] usb 5-1: USB disconnect, device number 4 [ 955.638829][ T8] usb 5-1: new full-speed USB device number 5 using dummy_hcd [ 956.008928][ T8] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 956.180651][ T8] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 956.190282][ T8] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 956.201502][ T8] usb 5-1: Product: syz [ 956.205897][ T8] usb 5-1: Manufacturer: syz [ 956.211831][ T8] usb 5-1: SerialNumber: syz 07:22:27 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x114, 0x114, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x137}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:22:27 executing program 1: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000080)) 07:22:27 executing program 0: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttynull\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5429, 0x0) 07:22:27 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000200)) [ 956.279709][ T8] cdc_ether: probe of 5-1:1.0 failed with error -22 07:22:27 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5423, 0x401000) 07:22:27 executing program 0: r0 = shmget(0x1, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x4000) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x4000) [ 956.479642][T10181] usb 5-1: USB disconnect, device number 5 07:22:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000440)={&(0x7f0000000280), 0x814907816992f335, &(0x7f0000000340)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) 07:22:28 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x4000) shmat(0x0, &(0x7f0000fed000/0x13000)=nil, 0x4000) r0 = shmget(0x1, 0x1000, 0x0, &(0x7f0000ff5000/0x1000)=nil) r1 = shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x7000) shmdt(r1) shmdt(r1) clock_gettime(0x0, 0x0) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x4000) 07:22:28 executing program 4: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttynull\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x541d, 0x0) 07:22:28 executing program 1: io_setup(0x800, &(0x7f00000028c0)=0x0) io_getevents(r0, 0x495, 0x0, 0x0, 0x0) 07:22:28 executing program 0: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:22:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5412, 0x400000) 07:22:30 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0x0, 0x4, 0x3}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:22:30 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x150, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x13e, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm_detail={0x103, 0x24, 0x13, 0x0, "555b928fd49aedb18131981ce91725a469f2cfe8ee3340c39298cbb6513b37cfa0bb2ef5245d249da7f8343b701027da3a1113def569124f50ee285e4d3b05b4c4c506e896bee5b58f715d6e5e3e5ea6eac88a1246be30459b236e857a05cb5895a476d1a5ef6bab2c7f1f92c400f3053cc705f5b0b3b583a7390415d00002af8b651fdc9dfa53ea121e8ef3822ac82300000000000000d8690000005eb20200000087d3c0cc5da0d23ac8263e7e1d46f902e14e9db928a0919e7508a39575b1f5c2c44138eab9488ec81a5e27e39fddb7f4ae8d57c7dda3ac7d08328dfb35ea36c6c5508e76b2e627a9a84005920c6769b0a9c2fa19d893492d3785e3b1d4"}]}}}]}}]}}, 0x0) 07:22:30 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5408, 0x40100a) 07:22:30 executing program 5: r0 = gettid() ptrace$getenv(0x4201, r0, 0x0, 0x0) 07:22:30 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvfrom$rxrpc(r0, 0x0, 0x0, 0x42, 0x0, 0x0) 07:22:30 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x540f, 0x0) 07:22:31 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd4", 0x5b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0xd) 07:22:31 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5429, 0x0) 07:22:31 executing program 3: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttynull\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5415, 0x0) 07:22:31 executing program 0: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:22:31 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5406, 0x400000) [ 959.748820][ T4840] usb 5-1: new high-speed USB device number 6 using dummy_hcd 07:22:31 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e", 0x46}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 959.998910][ T4840] usb 5-1: Using ep0 maxpacket: 8 [ 960.119630][ T4840] usb 5-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 960.288919][ T4840] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 960.298372][ T4840] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 960.325892][ T4840] usb 5-1: Product: syz [ 960.331074][ T4840] usb 5-1: Manufacturer: syz [ 960.335704][ T4840] usb 5-1: SerialNumber: syz [ 960.406304][ T4840] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 960.613328][T22507] usb 5-1: USB disconnect, device number 6 [ 961.389199][T22250] usb 5-1: new high-speed USB device number 7 using dummy_hcd [ 961.628926][T22250] usb 5-1: Using ep0 maxpacket: 8 [ 961.748966][T22250] usb 5-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 961.920754][T22250] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 961.934453][T22250] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 961.944912][T22250] usb 5-1: Product: syz [ 962.015662][T22250] usb 5-1: Manufacturer: syz [ 962.021610][T22250] usb 5-1: SerialNumber: syz [ 962.071180][T22250] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 962.279455][ T9739] usb 5-1: USB disconnect, device number 7 07:22:33 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {0x0, 0x0, 0x3}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:22:33 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x0, 0x0, 0x3}) 07:22:33 executing program 5: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:22:33 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x150, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x13e, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm_detail={0x103, 0x24, 0x13, 0x0, "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"}]}}}]}}]}}, 0x0) 07:22:34 executing program 3: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttynull\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5425, 0x0) 07:22:34 executing program 5: shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x5000) clock_gettime(0x0, &(0x7f0000000040)) 07:22:34 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x402c542c, 0x401000) 07:22:34 executing program 3: syz_usb_connect$cdc_ecm(0x0, 0x55, &(0x7f0000000140)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x43, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mbim_extended={0x8}]}}}]}}]}}, &(0x7f0000000080)={0x0, 0x0, 0x2e, &(0x7f0000000300)={0x5, 0xf, 0x2e, 0x4, [@generic={0x3, 0x10, 0xb}, @ss_container_id={0x14, 0x10, 0x4, 0x0, "da3e1dc9bd40a723210afe9220f91d6f"}, @wireless={0xb}, @ext_cap={0x7, 0x10, 0x2, 0x6}]}}) 07:22:34 executing program 5: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcsu\x00', 0x0, 0x0) shmat(0x0, &(0x7f0000c00000/0x400000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x4000) 07:22:34 executing program 1: r0 = shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x6000) shmdt(r0) [ 962.839013][ T9739] usb 5-1: new high-speed USB device number 8 using dummy_hcd 07:22:34 executing program 0: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000900), 0x0, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x80000001}}]}) 07:22:34 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x541d, 0x0) [ 963.078910][ T9739] usb 5-1: Using ep0 maxpacket: 8 [ 963.105024][T25050] hfs: umask requires a value [ 963.119574][T25050] hfs: unable to parse mount options [ 963.184109][T25050] hfs: umask requires a value [ 963.198862][T25050] hfs: unable to parse mount options [ 963.205162][ T9739] usb 5-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 963.210568][T10181] usb 4-1: new high-speed USB device number 8 using dummy_hcd [ 963.383402][ T9739] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 963.402660][ T9739] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 963.425263][ T9739] usb 5-1: Product: syz [ 963.433432][ T9739] usb 5-1: Manufacturer: syz [ 963.445754][ T9739] usb 5-1: SerialNumber: syz [ 963.490247][ T9739] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 963.715902][T22507] usb 5-1: USB disconnect, device number 8 [ 963.724223][T10181] usb 4-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 963.949389][T10181] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 963.958893][T10181] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 963.958927][T10181] usb 4-1: Product: syz [ 963.958946][T10181] usb 4-1: Manufacturer: syz [ 963.958966][T10181] usb 4-1: SerialNumber: syz [ 964.010287][T10181] cdc_ether: probe of 4-1:1.0 failed with error -22 [ 964.216123][T10181] usb 4-1: USB disconnect, device number 8 [ 964.988854][ T9739] usb 4-1: new high-speed USB device number 9 using dummy_hcd [ 965.429060][ T9739] usb 4-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 07:22:37 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:22:37 executing program 1: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttynull\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x540d, 0x0) 07:22:37 executing program 5: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f00000001c0)=ANY=[@ANYBLOB="12010000020000082505a1a440000102030109023b00010100000009040000000206000005240600000524"], 0x0) 07:22:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5412, 0x401000) 07:22:37 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x150, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x13e, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm_detail={0x103, 0x24, 0x13, 0x0, "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"}]}}}]}}]}}, 0x0) [ 965.609289][ T9739] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 965.628793][ T9739] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 07:22:37 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvfrom$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 07:22:37 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000140)={0x0}) [ 965.661760][ T9739] usb 4-1: Product: syz [ 965.676001][ T9739] usb 4-1: Manufacturer: syz [ 965.686446][ T9739] usb 4-1: SerialNumber: syz [ 965.750246][ T9739] cdc_ether: probe of 4-1:1.0 failed with error -22 07:22:37 executing program 0: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f00000000c0)={{0x12, 0x1, 0x250, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, &(0x7f0000000340)={0x0, 0x0, 0xcb, 0x0}) 07:22:37 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x802c542a, 0x0) [ 965.890333][ T4840] usb 6-1: new high-speed USB device number 95 using dummy_hcd [ 965.920168][T22382] usb 4-1: USB disconnect, device number 9 [ 965.950156][T22507] usb 5-1: new high-speed USB device number 9 using dummy_hcd 07:22:37 executing program 3: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttynull\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5418, 0x0) [ 966.148859][ T4840] usb 6-1: Using ep0 maxpacket: 8 [ 966.247589][T22507] usb 5-1: Using ep0 maxpacket: 8 [ 966.269185][ T4840] usb 6-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config 07:22:37 executing program 3: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000ac0)=ANY=[@ANYBLOB="12010000c0bb9b40b72040158fef000000010902120001000000000904000000ff"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000740)={0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x40, 0x21, 0x1, 0x1f}}) syz_usb_control_io(r0, 0x0, &(0x7f00000027c0)={0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002780)={0x40, 0x21, 0x1}}) syz_usb_control_io(r0, 0x0, &(0x7f00000001c0)={0xfffffffffffffe4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x40, 0x21, 0x1, 0x7}}) syz_usb_control_io(r0, 0x0, &(0x7f0000000940)={0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)={0x40, 0x21, 0x1}}) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000bc0)={0x2c, &(0x7f0000000900), 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, &(0x7f0000000f80)={0x84, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 966.328756][T10181] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 966.409712][T22507] usb 5-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 966.449099][ T4840] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 966.466225][ T4840] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 966.496992][ T4840] usb 6-1: Product: syz [ 966.508461][ T4840] usb 6-1: Manufacturer: syz [ 966.514727][ T4840] usb 6-1: SerialNumber: syz [ 966.569851][ T4840] usb 6-1: bad CDC descriptors [ 966.598902][T10181] usb 1-1: Using ep0 maxpacket: 8 [ 966.608055][T22507] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 966.624209][T22507] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 966.640224][T22507] usb 5-1: Product: syz [ 966.655043][T22507] usb 5-1: Manufacturer: syz 07:22:38 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5403, 0x400000) [ 966.679091][T22382] usb 4-1: new high-speed USB device number 10 using dummy_hcd [ 966.690404][T22507] usb 5-1: SerialNumber: syz [ 966.761248][T22507] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 966.779803][T10181] usb 1-1: unable to get BOS descriptor or descriptor too short [ 966.780972][ T4840] usb 6-1: USB disconnect, device number 95 [ 966.859884][T10181] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 967.022173][T22507] usb 5-1: USB disconnect, device number 9 [ 967.038845][T22382] usb 4-1: New USB device found, idVendor=20b7, idProduct=1540, bcdDevice=ef.8f [ 967.065107][T22382] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 967.081841][T10181] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 967.096388][T10181] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 967.105487][T22382] usb 4-1: config 0 descriptor?? [ 967.114211][T10181] usb 1-1: Product: syz [ 967.125074][T10181] usb 1-1: Manufacturer: syz [ 967.131401][T10181] usb 1-1: SerialNumber: syz [ 967.202935][T10181] cdc_ether: probe of 1-1:1.0 failed with error -22 [ 967.407925][ T8] usb 1-1: USB disconnect, device number 5 [ 967.560369][T22507] usb 6-1: new high-speed USB device number 96 using dummy_hcd [ 967.838854][T22507] usb 6-1: Using ep0 maxpacket: 8 [ 967.959025][T22507] usb 6-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 968.148952][T22507] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 968.158285][T22507] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 968.167726][T22507] usb 6-1: Product: syz [ 968.172884][T22507] usb 6-1: Manufacturer: syz [ 968.178049][T22507] usb 6-1: SerialNumber: syz [ 968.206841][T11529] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 968.240644][T22507] usb 6-1: bad CDC descriptors [ 968.259367][T22382] usb 4-1: ATUSB: AT86RF212 version 0 [ 968.444527][T22507] usb 6-1: USB disconnect, device number 96 [ 968.478878][T11529] usb 1-1: Using ep0 maxpacket: 8 [ 968.479023][T22382] usb 4-1: Firmware: major: 0, minor: 0, hardware type: ATUSB (0) [ 968.520219][T22382] usb 4-1: Firmware version (0.0) predates our first public release. [ 968.548615][T22382] usb 4-1: Please update to version 0.2 or newer 07:22:40 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:22:40 executing program 1: shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x7000) r0 = shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x7000) shmdt(r0) shmat(0x0, &(0x7f0000fff000/0x1000)=nil, 0x5000) 07:22:40 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x150, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x13e, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm_detail={0x103, 0x24, 0x13, 0x0, "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"}]}}}]}}]}}, 0x0) 07:22:40 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcsu\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0x5452, &(0x7f00000001c0)={0x280000000000009, 0x0}) [ 968.649639][T11529] usb 1-1: unable to get BOS descriptor or descriptor too short [ 968.689135][T22382] usb 4-1: Firmware: build 07:22:40 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x0, 0x2}) [ 968.749636][T11529] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 07:22:40 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r0, 0xc01064bd, &(0x7f0000000140)={0x0}) 07:22:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 968.899010][T22382] usb 4-1: atusb_control_msg: req 0x20 val 0x3 idx 0x2, error -71 [ 968.938844][T22382] usb 4-1: atusb_probe: setup failed, error = -71 [ 968.969725][T11529] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 968.993812][T11529] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 07:22:40 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5405, 0x0) [ 969.018812][T22507] usb 5-1: new high-speed USB device number 10 using dummy_hcd [ 969.039161][T11529] usb 1-1: Product: syz [ 969.068197][T11529] usb 1-1: Manufacturer: syz [ 969.088488][T11529] usb 1-1: SerialNumber: syz 07:22:40 executing program 1: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5401, 0x0) 07:22:40 executing program 5: r0 = shmget(0x1, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmat(r0, &(0x7f0000c00000/0x400000)=nil, 0x5000) [ 969.140930][T11529] usb 1-1: can't set config #1, error -71 [ 969.145200][T22382] atusb: probe of 4-1:0.0 failed with error -71 [ 969.180590][T11529] usb 1-1: USB disconnect, device number 6 [ 969.198929][T22382] usb 4-1: USB disconnect, device number 10 [ 969.279167][T22507] usb 5-1: Using ep0 maxpacket: 8 [ 969.410340][T22507] usb 5-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 969.614642][T22507] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 969.627386][T22507] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 969.643323][T22507] usb 5-1: Product: syz [ 969.647533][T22507] usb 5-1: Manufacturer: syz [ 969.662912][T22507] usb 5-1: SerialNumber: syz [ 969.738086][T22507] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 969.759127][T22382] usb 4-1: new high-speed USB device number 11 using dummy_hcd [ 969.989589][T22508] usb 5-1: USB disconnect, device number 10 [ 970.118972][T22382] usb 4-1: New USB device found, idVendor=20b7, idProduct=1540, bcdDevice=ef.8f [ 970.141188][T22382] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 970.184013][T22382] usb 4-1: config 0 descriptor?? 07:22:41 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5432, 0x0) 07:22:41 executing program 0: semtimedop(0x0, &(0x7f0000000000)=[{}, {}], 0x171, &(0x7f0000000040)={0x0, 0x989680}) [ 970.428917][T22382] usb 4-1: atusb_control_msg: req 0x10 val 0x0 idx 0x0, error -71 [ 970.437562][T22382] usb 4-1: Firmware version (0.0) predates our first public release. [ 970.476685][T22382] usb 4-1: Please update to version 0.2 or newer [ 970.485884][T22382] usb 4-1: atusb_probe: initialization failed, error = -71 [ 970.514264][T22382] atusb: probe of 4-1:0.0 failed with error -71 [ 970.540858][T22382] usb 4-1: USB disconnect, device number 11 07:22:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0xc, 0x0, 0xfffffffc}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:22:43 executing program 5: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc008240a, 0x0) 07:22:43 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:22:43 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f44cf0783279a494c8e4eba955b16e77f57966d4ba7560f29500352543b498fccba20bcae2b6f577b36b79f72f77e153f55e4fa6a", 0x99}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 07:22:43 executing program 4: 07:22:43 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443f", 0x24}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0xd) 07:22:43 executing program 4: 07:22:43 executing program 1: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000540)='/dev/fb1\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000580)={0x800, 0x1e0}) 07:22:43 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000300)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_SEC_KEY(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x14, r1, 0x5}, 0x14}}, 0x0) 07:22:43 executing program 4: 07:22:43 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3}) 07:22:43 executing program 5: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0x2405, 0x0) 07:22:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x114, 0x114, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x137}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:22:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f44cf0783279a494c8e4eba955b16e77f57966d4ba7560f29500352543b498fccba20bcae2b6f577b36b79f72f77e153f55", 0x96}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 07:22:46 executing program 5: r0 = socket$inet(0x10, 0x400000002, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000180007041dfffd946f610529802000001f040005000008000800070002000000", 0x24}], 0x1}, 0x0) 07:22:46 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x0, 0x0, 0x0) 07:22:46 executing program 0: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttynull\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5417, 0x0) 07:22:46 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:22:46 executing program 5: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x78, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:22:46 executing program 3: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttynull\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5406, 0x400000) 07:22:46 executing program 0: syz_usb_connect$cdc_ecm(0x0, 0x56, &(0x7f00000000c0)=ANY=[@ANYBLOB="12010000020000082505a1a4400001020301090244000101000000090400000202060000052406000005240000f30c240f"], 0x0) 07:22:46 executing program 3: r0 = shmget(0x1, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x5000) r1 = shmget(0x1, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r2 = shmget(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r3 = shmget(0x1, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r3, &(0x7f0000ffd000/0x3000)=nil, 0x4000) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) shmat(r1, &(0x7f0000ffe000/0x2000)=nil, 0x7000) shmat(r0, &(0x7f0000fff000/0x1000)=nil, 0x5000) 07:22:46 executing program 5: syz_usb_connect$cdc_ecm(0x0, 0x25, &(0x7f0000000140)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, 0x0) 07:22:46 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5404, 0xc04a01) [ 975.348908][T22382] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 975.448873][ T8] usb 6-1: new high-speed USB device number 97 using dummy_hcd [ 975.588881][T22382] usb 1-1: Using ep0 maxpacket: 8 [ 975.709461][T22382] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 975.720393][T22382] usb 1-1: config 1 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 2 [ 975.808922][ T8] usb 6-1: config index 0 descriptor too short (expected 59, got 19) [ 975.817089][ T8] usb 6-1: config 1 descriptor has 1 excess byte, ignoring [ 975.899123][T22382] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 975.909162][T22382] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 975.917150][T22382] usb 1-1: Product: syz [ 975.923758][T22382] usb 1-1: Manufacturer: syz [ 975.928387][T22382] usb 1-1: SerialNumber: syz [ 975.979208][ T8] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 975.989685][T22382] usb 1-1: bad CDC descriptors [ 975.998068][ T8] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 976.023268][ T8] usb 6-1: Product: syz [ 976.027479][ T8] usb 6-1: Manufacturer: syz [ 976.033534][ T8] usb 6-1: SerialNumber: syz [ 976.079941][ T8] usb 6-1: bad CDC descriptors [ 976.196671][ T8] usb 1-1: USB disconnect, device number 7 [ 976.282888][T22382] usb 6-1: USB disconnect, device number 97 [ 976.958796][T22382] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 977.058922][ T8] usb 6-1: new high-speed USB device number 98 using dummy_hcd [ 977.198749][T22382] usb 1-1: Using ep0 maxpacket: 8 [ 977.319334][T22382] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 977.335093][T22382] usb 1-1: config 1 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 2 [ 977.428975][ T8] usb 6-1: config index 0 descriptor too short (expected 59, got 19) [ 977.437361][ T8] usb 6-1: config 1 descriptor has 1 excess byte, ignoring [ 977.508872][T22382] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 977.518087][T22382] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 977.527652][T22382] usb 1-1: Product: syz [ 977.532755][T22382] usb 1-1: Manufacturer: syz [ 977.537487][T22382] usb 1-1: SerialNumber: syz [ 977.585156][T22382] usb 1-1: bad CDC descriptors [ 977.605520][ T8] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 977.615801][ T8] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 977.626110][ T8] usb 6-1: Product: syz [ 977.631279][ T8] usb 6-1: Manufacturer: syz [ 977.637004][ T8] usb 6-1: SerialNumber: syz [ 977.690217][ T8] usb 6-1: bad CDC descriptors [ 977.789024][ T8] usb 1-1: USB disconnect, device number 8 07:22:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x114, 0x114, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x137}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:22:49 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5415, 0x0) 07:22:49 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x0, 0x0, 0x0) 07:22:49 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5408, 0x401025) 07:22:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f44cf0783279a494c8e4eba955b16e77f57966d4ba7560f29500352543b498fccba20bcae2b6f577b36b79f72f77e153f55", 0x96}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 977.900108][T22382] usb 6-1: USB disconnect, device number 98 07:22:49 executing program 5: syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000a5f000/0x1000)=nil, 0x0) 07:22:49 executing program 3: syz_usb_connect$cdc_ecm(0x0, 0x56, &(0x7f00000000c0)=ANY=[@ANYBLOB="12010000020000082505a1a440000102030109023989ed89000000090400000d02060000052406000005240000000d240f0100000000000000000009058103300000000009058202ff0300000009050302"], 0x0) 07:22:49 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newsa={0xf0, 0x10, 0x1, 0x0, 0x0, {{@in=@multicast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in=@local}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 07:22:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5404, 0x4af000) 07:22:49 executing program 0: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:22:49 executing program 5: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttynull\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x402c542d, 0x0) 07:22:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 978.449331][T22382] usb 4-1: new high-speed USB device number 12 using dummy_hcd [ 978.698941][T22382] usb 4-1: Using ep0 maxpacket: 8 [ 978.828948][T22382] usb 4-1: config index 0 descriptor too short (expected 35129, got 68) [ 978.837351][T22382] usb 4-1: config 137 has too many interfaces: 237, using maximum allowed: 32 [ 978.859767][T22382] usb 4-1: config 137 has 1 interface, different from the descriptor's value: 237 [ 978.878464][T22382] usb 4-1: config 137 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 978.926010][T22382] usb 4-1: config 137 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 1023 [ 978.954837][T22382] usb 4-1: config 137 interface 0 altsetting 0 endpoint 0x3 has invalid wMaxPacketSize 0 [ 978.974029][T22382] usb 4-1: config 137 interface 0 altsetting 0 bulk endpoint 0x3 has invalid maxpacket 0 [ 978.986550][T22382] usb 4-1: config 137 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 13 [ 979.178958][T22382] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 979.188092][T22382] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 979.197812][T22382] usb 4-1: Product: syz [ 979.202782][T22382] usb 4-1: Manufacturer: syz [ 979.207405][T22382] usb 4-1: SerialNumber: syz [ 979.230861][T25422] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 979.249898][T22382] cdc_ether: probe of 4-1:137.0 failed with error -22 [ 979.466031][T22508] usb 4-1: USB disconnect, device number 12 [ 980.238867][ T8] usb 4-1: new high-speed USB device number 13 using dummy_hcd [ 980.478947][ T8] usb 4-1: Using ep0 maxpacket: 8 [ 980.599169][ T8] usb 4-1: config index 0 descriptor too short (expected 35129, got 68) [ 980.607870][ T8] usb 4-1: config 137 has too many interfaces: 237, using maximum allowed: 32 [ 980.617532][ T8] usb 4-1: config 137 has 1 interface, different from the descriptor's value: 237 [ 980.626975][ T8] usb 4-1: config 137 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 980.638328][ T8] usb 4-1: config 137 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 1023 [ 980.648741][ T8] usb 4-1: config 137 interface 0 altsetting 0 endpoint 0x3 has invalid wMaxPacketSize 0 [ 980.658785][ T8] usb 4-1: config 137 interface 0 altsetting 0 bulk endpoint 0x3 has invalid maxpacket 0 [ 980.668898][ T8] usb 4-1: config 137 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 13 [ 980.839064][ T8] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 980.848144][ T8] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 980.862006][ T8] usb 4-1: Product: syz [ 980.866170][ T8] usb 4-1: Manufacturer: syz [ 980.872284][ T8] usb 4-1: SerialNumber: syz [ 980.902330][T25422] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 980.920009][ T8] cdc_ether: probe of 4-1:137.0 failed with error -22 07:22:52 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x114, 0x114, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x137}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:22:52 executing program 5: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttynull\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x402c542d, 0x0) 07:22:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x54, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x4}, @HEADER={0x30}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xffffffdf}}, 0x0) 07:22:52 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x0, 0x0, 0x0) 07:22:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f44cf0783279a494c8e4eba955b16e77f57966d4ba7560f29500352543b498fccba20bcae2b6f577b36b79f72f77e153f55", 0x96}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 07:22:52 executing program 5: r0 = semget(0x1, 0x0, 0x0) semtimedop(r0, &(0x7f0000000080)=[{0x2, 0x29}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000380)=[{0x2, 0x1f}, {0x2, 0x1}], 0x2, 0x0) 07:22:52 executing program 3: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttynull\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5432, 0x0) 07:22:52 executing program 0: r0 = gettid() waitid(0x3, r0, 0xffffffffffffffff, 0x4, 0x0) [ 981.173756][T22382] usb 4-1: USB disconnect, device number 13 07:22:52 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x14, 0x0, 0x5}, 0x14}}, 0x0) 07:22:52 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x3) 07:22:52 executing program 0: syz_usb_connect$cdc_ecm(0x0, 0x62, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x50, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm={0x15}]}}}]}}]}}, 0x0) 07:22:53 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 981.799388][T22507] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 982.068897][T22507] usb 1-1: Using ep0 maxpacket: 8 [ 982.198871][T22507] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 982.400319][T22507] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 982.414195][T22507] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 982.424333][T22507] usb 1-1: Product: syz [ 982.428526][T22507] usb 1-1: Manufacturer: syz [ 982.435095][T22507] usb 1-1: SerialNumber: syz [ 982.500296][T22507] cdc_ether: probe of 1-1:1.0 failed with error -22 [ 982.706001][T22507] usb 1-1: USB disconnect, device number 9 [ 983.508842][T22507] usb 1-1: new high-speed USB device number 10 using dummy_hcd [ 983.758887][T22507] usb 1-1: Using ep0 maxpacket: 8 [ 983.911267][T22507] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 984.089397][T22507] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 984.099499][T22507] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 984.128731][T22507] usb 1-1: Product: syz [ 984.132937][T22507] usb 1-1: Manufacturer: syz 07:22:55 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {0x0, 0x0, 0xfffffffc}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:22:55 executing program 5: syz_usb_connect$cdc_ecm(0x2, 0x55, &(0x7f0000000140)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x43, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mbim_extended={0x8}]}}}]}}]}}, &(0x7f0000000080)={0xa, &(0x7f0000000000)={0xa}, 0x2e, &(0x7f0000000300)={0x5, 0xf, 0x2e, 0x4, [@generic={0x3, 0x10, 0xb}, @ss_container_id={0x14, 0x10, 0x4, 0x0, "da3e1dc9bd40a723210afe9220f91d6f"}, @wireless={0xb}, @ext_cap={0x7, 0x10, 0x2, 0x6}]}}) 07:22:55 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x150, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x13e, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm_detail={0x103, 0x24, 0x13, 0x0, "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"}]}}}]}}]}}, 0x0) 07:22:55 executing program 3: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x402, 0x0) write$capi20_data(r0, 0x0, 0x0) 07:22:55 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 984.137555][T22507] usb 1-1: SerialNumber: syz [ 984.200124][T22507] cdc_ether: probe of 1-1:1.0 failed with error -22 07:22:55 executing program 3: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttynull\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x802c542a, 0x0) 07:22:55 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) [ 984.420939][T22250] usb 1-1: USB disconnect, device number 10 07:22:56 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104307, &(0x7f0000000240)={0x1000000000003, 0x0}) 07:22:56 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0x4b41, 0x0) 07:22:56 executing program 3: add_key(&(0x7f0000000040)='rxrpc\x00', 0x0, &(0x7f00000000c0)="40b2ca1989a6ca22f19e6a6fc253cbc5c0bde91ad53fc0a48b2b3bdc9edfeee372255545f28484564f11f222f618eb024d960fff98ec265788f74302015b09c98764542d8ecbaef51513258881f71b5c88b62f23a55042f6d7451fc906beef47d9c824d858d947489f00710e9b87d74052f2612bd5ae7e1953eaa186477266699916bf8e77d18bf87b7ac1aae5fed302a0761887f4b994f0f66bf103247a198f2299271de419e998329041e9", 0xac, 0xfffffffffffffffd) [ 984.519062][T22382] usb 6-1: new full-speed USB device number 99 using dummy_hcd [ 984.526994][ T4840] usb 5-1: new high-speed USB device number 11 using dummy_hcd 07:22:56 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:22:56 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104307, &(0x7f0000000240)={0x1000000000003, 0x0}) [ 984.739492][ T4840] usb 5-1: device descriptor read/64, error 18 [ 984.949220][T22382] usb 6-1: not running at top speed; connect to a high speed hub [ 985.008889][ T4840] usb 5-1: new high-speed USB device number 12 using dummy_hcd [ 985.039904][T22382] usb 6-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 985.208871][ T4840] usb 5-1: device descriptor read/64, error 18 [ 985.220478][T22382] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 985.230045][T22382] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 985.238289][T22382] usb 6-1: Product: syz [ 985.244847][T22382] usb 6-1: Manufacturer: syz [ 985.263595][T22382] usb 6-1: SerialNumber: syz [ 985.320412][T22382] cdc_ether: probe of 6-1:1.0 failed with error -22 [ 985.329258][ T4840] usb usb5-port1: attempt power cycle [ 985.523715][T22507] usb 6-1: USB disconnect, device number 99 [ 986.038960][ T4840] usb 5-1: new high-speed USB device number 13 using dummy_hcd [ 986.128892][ T4840] usb 5-1: Invalid ep0 maxpacket: 0 [ 986.278810][ T4840] usb 5-1: new high-speed USB device number 14 using dummy_hcd [ 986.298845][T22250] usb 6-1: new full-speed USB device number 100 using dummy_hcd [ 986.369803][ T4840] usb 5-1: Invalid ep0 maxpacket: 0 [ 986.375323][ T4840] usb usb5-port1: unable to enumerate USB device [ 986.699084][T22250] usb 6-1: not running at top speed; connect to a high speed hub [ 986.780231][T22250] usb 6-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 986.949260][T22250] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 986.958404][T22250] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 986.967775][T22250] usb 6-1: Product: syz [ 986.972596][T22250] usb 6-1: Manufacturer: syz [ 986.977190][T22250] usb 6-1: SerialNumber: syz [ 987.029883][T22250] cdc_ether: probe of 6-1:1.0 failed with error -22 [ 987.197723][ T4840] usb 6-1: USB disconnect, device number 100 07:22:58 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0xd, 0x5, 0x2fb}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:22:58 executing program 3: syz_usb_connect$cdc_ecm(0x0, 0x56, &(0x7f00000000c0)=ANY=[@ANYBLOB="12010000020000082505a1a440000102030109024400010100000009040000020206000005"], 0x0) 07:22:58 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104307, &(0x7f0000000240)={0x1000000000003, 0x0}) 07:22:58 executing program 5: syz_usb_connect$cdc_ecm(0x2, 0x55, &(0x7f0000000140)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x43, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mbim_extended={0x8}]}}}]}}]}}, &(0x7f0000000080)={0xa, &(0x7f0000000000)={0xa}, 0x2e, &(0x7f0000000300)={0x5, 0xf, 0x2e, 0x4, [@generic={0x3, 0x10, 0xb}, @ss_container_id={0x14, 0x10, 0x4, 0x0, "da3e1dc9bd40a723210afe9220f91d6f"}, @wireless={0xb}, @ext_cap={0x7, 0x10, 0x2, 0x6}]}}) 07:22:58 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x150, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x13e, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm_detail={0x103, 0x24, 0x13, 0x0, "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"}]}}}]}}]}}, 0x0) 07:22:58 executing program 1: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f00000000c0)=ANY=[@ANYBLOB="12010000020000082505a1a440000102030109023b00010100000009040000000206000005"], 0x0) 07:22:59 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104307, &(0x7f0000000240)={0x1000000000003, 0x0}) 07:22:59 executing program 0: ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104307, &(0x7f0000000240)={0x1000000000003, 0x0}) [ 987.678905][T11529] usb 4-1: new high-speed USB device number 14 using dummy_hcd [ 987.729099][T22382] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 987.768962][T22508] usb 5-1: new high-speed USB device number 15 using dummy_hcd [ 987.808887][ T4840] usb 6-1: new full-speed USB device number 101 using dummy_hcd 07:22:59 executing program 0: ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104307, &(0x7f0000000240)={0x1000000000003, 0x0}) [ 987.939061][T11529] usb 4-1: Using ep0 maxpacket: 8 07:22:59 executing program 0: ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104307, &(0x7f0000000240)={0x1000000000003, 0x0}) [ 987.988788][T22382] usb 2-1: Using ep0 maxpacket: 8 [ 987.989438][T22508] usb 5-1: device descriptor read/64, error 18 [ 988.078893][T11529] usb 4-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 988.107098][T11529] usb 4-1: config 1 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 2 [ 988.109544][T22382] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config 07:22:59 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104307, &(0x7f0000000240)={0x1000000000003, 0x0}) [ 988.219177][ T4840] usb 6-1: not running at top speed; connect to a high speed hub [ 988.305718][T22508] usb 5-1: new high-speed USB device number 16 using dummy_hcd [ 988.309158][ T4840] usb 6-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 988.339593][T22382] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 988.349382][T11529] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 988.359310][T22382] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 988.377182][T11529] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 988.400258][T22382] usb 2-1: Product: syz 07:22:59 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104307, &(0x7f0000000240)={0x1000000000003, 0x0}) [ 988.409994][T11529] usb 4-1: Product: syz [ 988.425051][T22382] usb 2-1: Manufacturer: syz [ 988.436430][T11529] usb 4-1: Manufacturer: syz [ 988.448979][T22382] usb 2-1: SerialNumber: syz [ 988.464865][T11529] usb 4-1: SerialNumber: syz [ 988.509114][T22508] usb 5-1: device descriptor read/64, error 18 [ 988.509821][T22382] cdc_ether 2-1:1.0: skipping garbage [ 988.538916][ T4840] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 988.549270][T22382] usb 2-1: bad CDC descriptors [ 988.565059][ T4840] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 988.565382][T11529] cdc_ether 4-1:1.0: skipping garbage [ 988.605144][ T4840] usb 6-1: Product: syz [ 988.613021][T11529] usb 4-1: bad CDC descriptors [ 988.629198][ T4840] usb 6-1: Manufacturer: syz [ 988.639684][T22508] usb usb5-port1: attempt power cycle [ 988.655672][ T4840] usb 6-1: SerialNumber: syz [ 988.715076][T22250] usb 2-1: USB disconnect, device number 2 [ 988.733814][ T4840] cdc_ether: probe of 6-1:1.0 failed with error -22 [ 988.773450][T11529] usb 4-1: USB disconnect, device number 14 [ 989.031781][T11529] usb 6-1: USB disconnect, device number 101 [ 989.394001][T22508] usb 5-1: new high-speed USB device number 17 using dummy_hcd [ 989.488851][T22250] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 989.517575][T22508] usb 5-1: Invalid ep0 maxpacket: 0 [ 989.588768][T22507] usb 4-1: new high-speed USB device number 15 using dummy_hcd [ 989.689542][T22508] usb 5-1: new high-speed USB device number 18 using dummy_hcd [ 989.738876][T22250] usb 2-1: Using ep0 maxpacket: 8 [ 989.810755][T22508] usb 5-1: Invalid ep0 maxpacket: 0 [ 989.817499][T22508] usb usb5-port1: unable to enumerate USB device [ 989.859631][T22250] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 989.878771][T22507] usb 4-1: Using ep0 maxpacket: 8 [ 990.039435][T22507] usb 4-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 990.039862][T22250] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 990.055672][T22507] usb 4-1: config 1 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 2 [ 990.062044][T22250] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 990.080169][T22250] usb 2-1: Product: syz [ 990.084344][T22250] usb 2-1: Manufacturer: syz [ 990.089607][T22250] usb 2-1: SerialNumber: syz [ 990.130284][T22250] cdc_ether 2-1:1.0: skipping garbage [ 990.135713][T22250] usb 2-1: bad CDC descriptors [ 990.259135][T22507] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 990.268559][T22507] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 990.278465][T22507] usb 4-1: Product: syz [ 990.283673][T22507] usb 4-1: Manufacturer: syz [ 990.288353][T22507] usb 4-1: SerialNumber: syz [ 990.334479][T22250] usb 2-1: USB disconnect, device number 3 [ 990.399191][T22507] usb 4-1: can't set config #1, error -71 07:23:01 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x114, 0x114, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x137}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:23:01 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104307, &(0x7f0000000240)={0x1000000000003, 0x0}) 07:23:01 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x80045439, 0x0) 07:23:01 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$rxrpc(r0, &(0x7f00000001c0)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast1}}, 0x24) [ 990.441178][T22507] usb 4-1: USB disconnect, device number 15 07:23:02 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x150, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x13e, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm_detail={0x103, 0x24, 0x13, 0x0, "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"}]}}}]}}]}}, 0x0) 07:23:02 executing program 1: r0 = shmat(0x0, &(0x7f0000fff000/0x1000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x4000) shmat(0x0, &(0x7f0000fff000/0x1000)=nil, 0x0) shmdt(r0) 07:23:02 executing program 0: openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104307, &(0x7f0000000240)={0x1000000000003, 0x0}) 07:23:02 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5409, 0x3) 07:23:02 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0xfffffffffffffffb) 07:23:02 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4840, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:23:02 executing program 1: shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x0) shmat(0x0, &(0x7f0000c00000/0x400000)=nil, 0x5000) 07:23:02 executing program 0: openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104307, &(0x7f0000000240)={0x1000000000003, 0x0}) [ 990.999057][T22382] usb 5-1: new high-speed USB device number 19 using dummy_hcd [ 991.198794][T22382] usb 5-1: device descriptor read/64, error 18 [ 991.468876][T22382] usb 5-1: new high-speed USB device number 20 using dummy_hcd [ 991.658833][T22382] usb 5-1: device descriptor read/64, error 18 [ 991.779789][T22382] usb usb5-port1: attempt power cycle [ 992.488834][T22382] usb 5-1: new high-speed USB device number 21 using dummy_hcd [ 992.579175][T22382] usb 5-1: Invalid ep0 maxpacket: 0 [ 992.728826][T22382] usb 5-1: new high-speed USB device number 22 using dummy_hcd [ 992.820170][ T3251] ieee802154 phy0 wpan0: encryption failed: -22 [ 992.826504][ T3251] ieee802154 phy1 wpan1: encryption failed: -22 [ 992.833210][T22382] usb 5-1: Invalid ep0 maxpacket: 0 [ 992.840091][T22382] usb usb5-port1: unable to enumerate USB device 07:23:05 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x114, 0x114, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x137}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:23:05 executing program 1: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttynull\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x541b, 0x0) 07:23:05 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5422, 0x0) 07:23:05 executing program 3: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcsu\x00', 0x0, 0x0) shmat(0x0, &(0x7f0000c00000/0x400000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x5000) 07:23:05 executing program 0: openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104307, &(0x7f0000000240)={0x1000000000003, 0x0}) 07:23:05 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, 0x0) 07:23:05 executing program 3: r0 = shmget(0x1, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x5000) r1 = shmget(0x1, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r1, &(0x7f0000ffd000/0x3000)=nil, 0x4000) shmat(r1, &(0x7f0000ffe000/0x2000)=nil, 0x7000) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x7000) 07:23:05 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5413, 0x0) 07:23:05 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104307, 0x0) 07:23:05 executing program 1: r0 = socket$inet(0x2, 0x3, 0x800000000000b) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000080), &(0x7f0000000140)=0x30) 07:23:05 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104307, 0x0) 07:23:05 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, 0x0) [ 994.068897][T22250] usb 5-1: new high-speed USB device number 23 using dummy_hcd [ 994.318947][T22250] usb 5-1: Using ep0 maxpacket: 8 [ 994.439677][T22250] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 994.609534][T22250] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 994.623949][T22250] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 994.632292][T22250] usb 5-1: Product: syz [ 994.636540][T22250] usb 5-1: Manufacturer: syz [ 994.646496][T22250] usb 5-1: SerialNumber: syz [ 994.690060][T22250] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 994.893746][ T8] usb 5-1: USB disconnect, device number 23 07:23:08 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x114, 0x114, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x137}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:23:08 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$IP_SET_OP_GET_BYNAME(r0, 0x1, 0x53, 0x0, &(0x7f0000000080)) 07:23:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000100)=""/97, 0x0, 0x61}, 0x20) 07:23:08 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104307, 0x0) 07:23:08 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) 07:23:08 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, 0x0) 07:23:08 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104307, &(0x7f0000000240)={0x0, 0x0}) 07:23:08 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_buf(r0, 0x0, 0x20, &(0x7f00000000c0)=""/17, &(0x7f0000000100)=0x11) 07:23:08 executing program 5: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttynull\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5408, 0x400000) 07:23:08 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104307, &(0x7f0000000240)={0x0, 0x0}) [ 996.959531][T22508] usb 5-1: new high-speed USB device number 24 using dummy_hcd 07:23:08 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000000c0)={@remote, @private=0xa010102}, 0xc) 07:23:08 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x3, 0x0, &(0x7f00000002c0)) [ 997.218795][T22508] usb 5-1: Using ep0 maxpacket: 8 [ 997.348855][T22508] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 997.539530][T22508] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 997.552238][T22508] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 997.562540][T22508] usb 5-1: Product: syz [ 997.566866][T22508] usb 5-1: Manufacturer: syz [ 997.575106][T22508] usb 5-1: SerialNumber: syz [ 997.620151][T22508] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 997.825129][T22508] usb 5-1: USB disconnect, device number 24 07:23:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0x0, 0x5, 0x2fb}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:23:11 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) getsockname(r0, &(0x7f0000000100)=@x25={0x9, @remote}, &(0x7f00000000c0)=0x80) 07:23:11 executing program 3: bpf$ITER_CREATE(0x15, 0x0, 0x0) 07:23:11 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104307, &(0x7f0000000240)={0x0, 0x0}) 07:23:11 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000040)={'filter\x00', 0x7, 0x4, 0x418, 0x110, 0x110, 0x110, 0x330, 0x330, 0x330, 0x4, 0x0, {[{{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local, @mac=@dev={[], 0x32}, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @remote, @rand_addr=0x64010100, 0xf, 0xffffffff}}}, {{@arp={@local, @private=0x4, 0x0, 0x0, 0x0, 0x0, {@empty, {[0xff, 0xff, 0x0, 0xff, 0xff]}}, {@empty, {[0x0, 0x0, 0xff]}}, 0x0, 0x0, 0x800, 0xd676, 0x9, 0x86f4, 'rose0\x00', 'bridge_slave_0\x00', {}, {}, 0x0, 0x115}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@remote, @multicast1, @multicast1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x468) 07:23:11 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, 0x0) 07:23:11 executing program 0: socketpair(0x25, 0x5, 0x4, &(0x7f0000000200)) [ 999.845027][T25827] x_tables: duplicate underflow at hook 1 07:23:11 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f00000001c0)={0x0, @rand_addr, 0x0, 0x0, 'ovf\x00', 0x0, 0x7}, 0x2c) 07:23:11 executing program 5: syz_emit_ethernet(0x5a, &(0x7f0000000780)={@local, @random="c3ae9038575f", @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @private}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, {[@eol, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "9e348984e553f9f9481b58c223535ffc"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}, 0x0) 07:23:11 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1, 0x1, 0x0, 0x0, {0x8}}, 0x14}}, 0x0) 07:23:11 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000340)={0x0, {}, {0x2, 0x4e23, @empty}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000300)='wg0\x00', 0x1, 0x8, 0x1}) [ 1000.051284][T25840] IPVS: set_ctl: invalid protocol: 0 0.0.0.0:0 07:23:11 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, 0x0, 0x0) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) [ 1000.119835][T22508] usb 5-1: new high-speed USB device number 25 using dummy_hcd [ 1000.388978][T22508] usb 5-1: Using ep0 maxpacket: 8 [ 1000.509740][T22508] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1000.699177][T22508] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1000.708265][T22508] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1000.717587][T22508] usb 5-1: Product: syz [ 1000.723033][T22508] usb 5-1: Manufacturer: syz [ 1000.727659][T22508] usb 5-1: SerialNumber: syz [ 1000.780011][T22508] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 1000.984644][T22508] usb 5-1: USB disconnect, device number 25 07:23:14 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000a40)='NLBL_MGMT\x00', r0) 07:23:14 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) recvfrom$rxrpc(r0, 0x0, 0x0, 0xa1, 0x0, 0x0) 07:23:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 07:23:14 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x4, &(0x7f0000000080)=@framed={{}, [@ldst={0x0, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:23:14 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0x0, 0x0, 0x2fb}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:23:14 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x51, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3f, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm_detail={0x4}]}}}]}}]}}, 0x0) 07:23:14 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/time_for_children\x00') 07:23:14 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000}}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xbf, &(0x7f0000000100)=""/191, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:23:14 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x8, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x7100}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:23:14 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000004f80)=[{{&(0x7f0000000000)={0x2, 0x0, @private}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000040)="d6", 0x1}, {&(0x7f0000000080)="f3", 0x1}, {&(0x7f00000000c0)='V', 0x1}], 0x3, &(0x7f0000000240)=[@ip_ttl={{0x14}}, @ip_ttl={{0x14}}], 0x30}}, {{&(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10, &(0x7f0000000540)=[{&(0x7f0000000300)='0', 0x1}], 0x1, &(0x7f0000000580)=[@ip_tos_u8={{0x11}}], 0x18}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0) 07:23:14 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000000c0)={@remote, @private}, 0xc) 07:23:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@ptr={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000040)=""/225, 0x28, 0xe1, 0x1}, 0x20) 07:23:14 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000080)={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback}, 0xc) 07:23:14 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x8, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0xa, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1003.158857][T22508] usb 5-1: new high-speed USB device number 26 using dummy_hcd 07:23:14 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0xe, 0x0, &(0x7f00000002c0)) 07:23:14 executing program 1: syz_emit_ethernet(0x4a, &(0x7f00000015c0)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "dc086f", 0x14, 0x6, 0x0, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1003.448872][T22508] usb 5-1: Using ep0 maxpacket: 8 [ 1003.588924][T22508] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1003.768942][T22508] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1003.778025][T22508] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1003.787699][T22508] usb 5-1: Product: syz [ 1003.792955][T22508] usb 5-1: Manufacturer: syz [ 1003.797578][T22508] usb 5-1: SerialNumber: syz [ 1003.840046][T22508] usb 5-1: bad CDC descriptors [ 1004.057132][T22508] usb 5-1: USB disconnect, device number 26 07:23:17 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0x0, 0x0, 0x2fb}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:23:17 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x8, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r0, 0x0, 0x0}, 0x10) 07:23:17 executing program 5: syz_emit_ethernet(0xde, &(0x7f00000015c0)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "dc086f", 0xa8, 0x6, 0x0, @dev={0xfe, 0x80, [], 0x1b}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, {[@srh={0x0, 0x2, 0x4, 0x1, 0xb8, 0x0, 0x3316, [@mcast2]}, @srh={0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, @dstopts={0x0, 0xb, [], [@pad1, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}, @calipso={0x7, 0x38, {0x0, 0xc, 0x80, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, @ra, @generic]}, @fragment={0x0, 0x0, 0x5}], {{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x2, {[@window={0x3, 0x3}]}}}}}}}}, &(0x7f0000000040)={0x0, 0x0, [0x7de, 0x0, 0x663]}) 07:23:17 executing program 0: syz_emit_ethernet(0x62, &(0x7f0000000780)={@local, @random="c3ae9038575f", @void, {@ipv4={0x800, @tcp={{0x10, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @private, {[@ra={0x94, 0x4}, @ssrr={0x89, 0xb, 0x0, [@loopback, @multicast1]}, @timestamp_prespec={0x44, 0x1c, 0x0, 0x3, 0x0, [{}, {@empty}, {@multicast2}]}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:23:17 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) connect$packet(r0, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) 07:23:17 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x51, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3f, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm_detail={0x4}]}}}]}}]}}, 0x0) 07:23:17 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x11, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:23:17 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x12240, 0x0) 07:23:17 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f0000000180)="bd2dedaaba6cee46b9537dd23303f7e7", 0x10) 07:23:17 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) sendto$l2tp(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) 07:23:17 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @broadcast}, 0x394875800731df65, 0x0, 0x0, 0x0, 0x100}) 07:23:17 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0xc, 0x0, &(0x7f00000002c0)) [ 1006.309055][T22508] usb 5-1: new high-speed USB device number 27 using dummy_hcd [ 1006.599019][T22508] usb 5-1: Using ep0 maxpacket: 8 [ 1006.739649][T22508] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1006.969003][T22508] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1006.978086][T22508] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1006.987237][T22508] usb 5-1: Product: syz [ 1006.993599][T22508] usb 5-1: Manufacturer: syz [ 1006.998218][T22508] usb 5-1: SerialNumber: syz [ 1007.050024][T22508] usb 5-1: bad CDC descriptors [ 1007.253313][T22382] usb 5-1: USB disconnect, device number 27 07:23:20 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {0x0, 0x0, 0x2fb}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:23:20 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) recvmsg(r0, &(0x7f0000000800)={&(0x7f0000000040)=@qipcrtr, 0x80, 0x0}, 0x40002040) 07:23:20 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000240)={'raw\x00'}, &(0x7f00000002c0)=0xfffffff4) 07:23:20 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000340)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r1, 0x511, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8}]}, 0x1c}}, 0x0) 07:23:20 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000040)={'filter\x00', 0x7, 0x4, 0x418, 0x110, 0x110, 0x110, 0x330, 0x330, 0x330, 0x4, 0x0, {[{{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local, @mac=@dev, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @remote}}}, {{@arp={@local, @private, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'rose0\x00', 'bridge_slave_0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@remote, @multicast1, @multicast1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x468) 07:23:20 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x51, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3f, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm_detail={0x4}]}}}]}}]}}, 0x0) [ 1009.095776][T25981] x_tables: duplicate underflow at hook 1 07:23:20 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x8, 0x0, &(0x7f00000002c0)) 07:23:20 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, 0x0, 0x0) 07:23:20 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x2, 0x0, &(0x7f00000002c0)) 07:23:20 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000180)={@private, @multicast1}, 0xc) 07:23:20 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000200)='M', 0x1}], 0x1) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) splice(r0, 0x0, r1, 0x0, 0xffffffff, 0x0) 07:23:20 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, 0x0, 0x0) [ 1009.408863][T22382] usb 5-1: new high-speed USB device number 28 using dummy_hcd [ 1009.698893][T22382] usb 5-1: Using ep0 maxpacket: 8 [ 1009.828896][T22382] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1010.019809][T22382] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1010.029059][T22382] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1010.037066][T22382] usb 5-1: Product: syz [ 1010.044077][T22382] usb 5-1: Manufacturer: syz [ 1010.049276][T22382] usb 5-1: SerialNumber: syz [ 1010.090505][T22382] usb 5-1: bad CDC descriptors [ 1010.295614][T10181] usb 5-1: USB disconnect, device number 28 07:23:23 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {0x0, 0x0, 0x3}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:23:23 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x8, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0xb0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:23:23 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000180)={'macsec0\x00', &(0x7f0000000140)=@ethtool_eee={0x44}}) 07:23:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000000)={'security\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 07:23:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f000000a540)={0x0, 0x0, &(0x7f000000a4c0)=[{&(0x7f0000000180)=ANY=[@ANYBLOB="140200002000014b000000000000000001"], 0x214}], 0x1}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00', r0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00', r0) recvmmsg(r0, &(0x7f0000002500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:23:23 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0xd1, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xbf, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm_detail={0x84, 0x24, 0x13, 0x0, "555b928fd49aedb18131981ce91725a469f2cfe8ee3340c39298cbb6513b37cfa0bb2ef5245d249da7f8343b701027da3a1113def569124f50ee285e4d3b05b4c4c506e896bee5b58f715d6e5e3e5ea6eac88a1246be30459b236e857a05cb5895a476d1a5ef6bab2c7f1f92c400f3053cc705f5b0b3b583a7390415d00002af"}]}}}]}}]}}, 0x0) 07:23:23 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000180)={0x6, @empty, 0x0, 0x1, 'wrr\x00'}, 0x2c) 07:23:23 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000080)={'ipvs\x00'}, &(0x7f0000000100)=0x1e) 07:23:23 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @multicast2}, {0x0, @random="93bbf958a0e4"}, 0x0, {0x2, 0x0, @loopback}, 'netpci0\x00'}) 07:23:23 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x1, 0x0, [0x0, 0x20000040, 0x20000070, 0x200000a0], 0x0, 0x0, 0x0}, 0x42e) 07:23:24 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) [ 1012.528886][T22382] usb 5-1: new high-speed USB device number 29 using dummy_hcd 07:23:24 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="9593b6d0cac29708200afe7a448488790ed6345c", 0x14) [ 1012.779078][T22382] usb 5-1: Using ep0 maxpacket: 8 [ 1012.899658][T22382] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1013.069183][T22382] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1013.078266][T22382] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1013.087486][T22382] usb 5-1: Product: syz [ 1013.092406][T22382] usb 5-1: Manufacturer: syz [ 1013.096999][T22382] usb 5-1: SerialNumber: syz [ 1013.140175][T22382] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 1013.349137][T22507] usb 5-1: USB disconnect, device number 29 07:23:26 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x114, 0x114, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x137}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:23:26 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)={0x14, 0x453, 0x0, 0x0, 0x0, "19"}, 0x14}}, 0x0) 07:23:26 executing program 1: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000000)={'security\x00', 0x2, [{}, {}]}, 0x48) accept$inet(0xffffffffffffffff, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 07:23:26 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, 0x0, 0x0) 07:23:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) read$alg(r1, &(0x7f0000000080)=""/58, 0x3a) 07:23:26 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0xd1, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xbf, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm_detail={0x84, 0x24, 0x13, 0x0, "555b928fd49aedb18131981ce91725a469f2cfe8ee3340c39298cbb6513b37cfa0bb2ef5245d249da7f8343b701027da3a1113def569124f50ee285e4d3b05b4c4c506e896bee5b58f715d6e5e3e5ea6eac88a1246be30459b236e857a05cb5895a476d1a5ef6bab2c7f1f92c400f3053cc705f5b0b3b583a7390415d00002af"}]}}}]}}]}}, 0x0) 07:23:26 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = socket$l2tp(0x2, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000000c0)={@remote, @private, r2}, 0xc) [ 1015.342670][ T37] audit: type=1107 audit(1617953006.843:40): pid=26079 uid=0 auid=4294967295 ses=4294967295 subj==unconfined msg='' 07:23:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmsg(r0, 0x0, 0x22) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x9]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x48}}, 0x0) close(r1) 07:23:27 executing program 5: syz_emit_ethernet(0xfc0, &(0x7f0000000000)={@link_local, @random="142685838452", @val={@void}, {@ipv4={0x800, @dccp={{0x7, 0x4, 0x0, 0x0, 0xfae, 0x0, 0x0, 0x0, 0x21, 0x0, @multicast2, @loopback, {[@cipso={0x86, 0x8, 0x0, [{0x0, 0x2}]}]}}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "e50155", 0x0, "b803a9"}, "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"}}}}}, 0x0) 07:23:27 executing program 1: bpf$ITER_CREATE(0x16, 0x0, 0x0) 07:23:27 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x60, 0x0, &(0x7f00000002c0)) 07:23:27 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x1, &(0x7f0000000040)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}], &(0x7f0000000080)='GPL\x00', 0x6, 0xa1, &(0x7f00000000c0)=""/161, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1015.750410][T22250] usb 5-1: new high-speed USB device number 30 using dummy_hcd [ 1016.019110][T22250] usb 5-1: Using ep0 maxpacket: 8 [ 1016.148974][T22250] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1016.349147][T22250] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1016.358243][T22250] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1016.367540][T22250] usb 5-1: Product: syz [ 1016.372835][T22250] usb 5-1: Manufacturer: syz [ 1016.377460][T22250] usb 5-1: SerialNumber: syz [ 1016.450553][T22250] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 1016.658484][T22250] usb 5-1: USB disconnect, device number 30 07:23:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x114, 0x114, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x137}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:23:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={0x0, &(0x7f0000000140)=""/131, 0x0, 0x83, 0x3}, 0x20) 07:23:29 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x880340, 0x0) 07:23:29 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_int(r0, 0x0, 0xc, 0x0, 0x0) 07:23:29 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x1c, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:23:29 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0xd1, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xbf, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm_detail={0x84, 0x24, 0x13, 0x0, "555b928fd49aedb18131981ce91725a469f2cfe8ee3340c39298cbb6513b37cfa0bb2ef5245d249da7f8343b701027da3a1113def569124f50ee285e4d3b05b4c4c506e896bee5b58f715d6e5e3e5ea6eac88a1246be30459b236e857a05cb5895a476d1a5ef6bab2c7f1f92c400f3053cc705f5b0b3b583a7390415d00002af"}]}}}]}}]}}, 0x0) 07:23:30 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, 0x0) 07:23:30 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000240)={'raw\x00'}, &(0x7f00000002c0)=0x54) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x4e23, @rand_addr=0x64010102}, {0x2, 0x4e20, @broadcast}, {0x2, 0x4e22, @broadcast}, 0x394875800731df65, 0x0, 0x0, 0x0, 0x100, &(0x7f0000000000)='wg0\x00', 0x20, 0x4, 0x7dc}) socket$inet6_udplite(0xa, 0x2, 0x88) 07:23:30 executing program 0: r0 = socket(0x18, 0x0, 0x2) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 07:23:30 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x7}}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xbf, &(0x7f0000000100)=""/191, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:23:30 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000004f80)=[{{&(0x7f0000000000)={0x2, 0x0, @private}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000040)="d6", 0x1}, {&(0x7f0000000080)="f3", 0x1}, {&(0x7f00000000c0)='V', 0x1}], 0x3}}, {{&(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10, &(0x7f0000000540)=[{&(0x7f0000000300)='0', 0x1}], 0x1, &(0x7f0000000580)=[@ip_tos_u8={{0x11}}], 0x18}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0) 07:23:30 executing program 3: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001c40)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000540)=@framed, &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 1018.829086][T22382] usb 5-1: new high-speed USB device number 31 using dummy_hcd [ 1019.118282][T22382] usb 5-1: Using ep0 maxpacket: 8 [ 1019.248944][T22382] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1019.449183][T22382] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1019.458295][T22382] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1019.466536][T22382] usb 5-1: Product: syz [ 1019.470838][T22382] usb 5-1: Manufacturer: syz [ 1019.475459][T22382] usb 5-1: SerialNumber: syz [ 1019.530475][T22382] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 1019.734059][T22382] usb 5-1: USB disconnect, device number 31 07:23:33 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x114, 0x114, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x137}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:23:33 executing program 0: syz_emit_ethernet(0xe81, &(0x7f0000000000)={@link_local, @random="142685838452", @val={@void}, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0xe6f, 0x0, 0x0, 0x0, 0x21, 0x0, @multicast2, @loopback}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "e50155", 0x0, "b803a9"}, "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"}}}}}, 0x0) 07:23:33 executing program 5: socket(0x33, 0x0, 0x0) 07:23:33 executing program 1: bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) 07:23:33 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x8, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, r0}, 0x14) 07:23:33 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x111, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xff, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm_detail={0xc4, 0x24, 0x13, 0x0, "555b928fd49aedb18131981ce91725a469f2cfe8ee3340c39298cbb6513b37cfa0bb2ef5245d249da7f8343b701027da3a1113def569124f50ee285e4d3b05b4c4c506e896bee5b58f715d6e5e3e5ea6eac88a1246be30459b236e857a05cb5895a476d1a5ef6bab2c7f1f92c400f3053cc705f5b0b3b583a7390415d00002af8b651fdc9dfa53ea121e8ef3822ac82300000000000000d8690000005eb20200000087d3c0cc5da0d23ac8263e7e1d46f902e14e9db928a0919e7508a39575b1"}]}}}]}}]}}, 0x0) 07:23:33 executing program 5: socket$rxrpc(0x21, 0x2, 0xa) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0xffffffffffffff93) 07:23:33 executing program 0: socket(0xa, 0x0, 0x7fff) 07:23:33 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000000)={r0}) 07:23:33 executing program 1: bpf$BPF_PROG_ATTACH(0x12, &(0x7f0000000080), 0x14) 07:23:33 executing program 5: syz_mount_image$adfs(&(0x7f0000000080)='adfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x0, &(0x7f0000000800)={[], [{@uid_eq={'uid'}}]}) 07:23:33 executing program 0: r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x8, 0x0, &(0x7f0000000140)=[@enter_looper, @register_looper], 0x0, 0x0, 0x0}) [ 1021.918881][ T4840] usb 5-1: new high-speed USB device number 32 using dummy_hcd [ 1022.066966][T26211] ADFS-fs (loop5): error: can't find an ADFS filesystem on dev loop5. [ 1022.124789][T26211] ADFS-fs (loop5): error: can't find an ADFS filesystem on dev loop5. [ 1022.179062][ T4840] usb 5-1: Using ep0 maxpacket: 8 [ 1022.299718][ T4840] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1022.489629][ T4840] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1022.509700][ T4840] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1022.533097][ T4840] usb 5-1: Product: syz [ 1022.543121][ T4840] usb 5-1: Manufacturer: syz [ 1022.547849][ T4840] usb 5-1: SerialNumber: syz [ 1022.610358][ T4840] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 1022.813950][ T4840] usb 5-1: USB disconnect, device number 32 07:23:36 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:23:36 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000900)=[@mask_cswp={0x58, 0x114, 0x9, {{}, &(0x7f0000000880), 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a}}], 0x58}, 0x0) 07:23:36 executing program 1: clock_gettime(0x7d2b2a76ce1240d6, 0x0) 07:23:36 executing program 0: r0 = socket(0x1e, 0x1, 0x0) read$alg(r0, &(0x7f0000000040)=""/107, 0x6b) 07:23:36 executing program 5: r0 = socket(0x22, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f0000002540)={0x0, 0x0, 0x0}, 0x42) 07:23:36 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x111, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xff, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm_detail={0xc4, 0x24, 0x13, 0x0, "555b928fd49aedb18131981ce91725a469f2cfe8ee3340c39298cbb6513b37cfa0bb2ef5245d249da7f8343b701027da3a1113def569124f50ee285e4d3b05b4c4c506e896bee5b58f715d6e5e3e5ea6eac88a1246be30459b236e857a05cb5895a476d1a5ef6bab2c7f1f92c400f3053cc705f5b0b3b583a7390415d00002af8b651fdc9dfa53ea121e8ef3822ac82300000000000000d8690000005eb20200000087d3c0cc5da0d23ac8263e7e1d46f902e14e9db928a0919e7508a39575b1"}]}}}]}}]}}, 0x0) 07:23:36 executing program 1: recvmsg$kcm(0xffffffffffffffff, 0x0, 0x80002162) [ 1024.788470][T26243] atomic_op ffff888033258198 conn xmit_atomic 0000000000000000 07:23:36 executing program 5: timer_create(0x3, 0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x3938700}}, 0x0) 07:23:36 executing program 0: r0 = socket(0x10, 0x3, 0x6) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000002640)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 1024.843483][T26249] atomic_op ffff88801b72f998 conn xmit_atomic 0000000000000000 07:23:36 executing program 3: r0 = socket(0x11, 0x2, 0x0) recvfrom$phonet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 07:23:36 executing program 0: syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000580)='./file2\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x5) 07:23:36 executing program 1: r0 = socket(0x2, 0x1, 0x0) setsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, &(0x7f0000000080), 0x4) [ 1025.059073][ T4840] usb 5-1: new high-speed USB device number 33 using dummy_hcd [ 1025.207430][T26265] loop0: detected capacity change from 0 to 264192 [ 1025.309025][ T4840] usb 5-1: Using ep0 maxpacket: 8 [ 1025.449060][ T4840] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1025.638963][ T4840] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1025.648079][ T4840] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1025.676603][ T4840] usb 5-1: Product: syz [ 1025.681153][ T4840] usb 5-1: Manufacturer: syz [ 1025.685778][ T4840] usb 5-1: SerialNumber: syz [ 1025.750370][ T4840] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 1025.956605][T22507] usb 5-1: USB disconnect, device number 33 07:23:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x8, 0x3, 0x7}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:23:39 executing program 5: r0 = socket(0x18, 0x0, 0x1) getsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, 0x0, 0x0) 07:23:39 executing program 3: r0 = gettid() tkill(r0, 0x100031) 07:23:39 executing program 1: rt_sigaction(0xb, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x8, &(0x7f00000002c0)) 07:23:39 executing program 0: syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000580)='./file2\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x5) 07:23:39 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x111, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xff, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm_detail={0xc4, 0x24, 0x13, 0x0, "555b928fd49aedb18131981ce91725a469f2cfe8ee3340c39298cbb6513b37cfa0bb2ef5245d249da7f8343b701027da3a1113def569124f50ee285e4d3b05b4c4c506e896bee5b58f715d6e5e3e5ea6eac88a1246be30459b236e857a05cb5895a476d1a5ef6bab2c7f1f92c400f3053cc705f5b0b3b583a7390415d00002af8b651fdc9dfa53ea121e8ef3822ac82300000000000000d8690000005eb20200000087d3c0cc5da0d23ac8263e7e1d46f902e14e9db928a0919e7508a39575b1"}]}}}]}}]}}, 0x0) [ 1027.817429][T26295] loop0: detected capacity change from 0 to 264192 07:23:39 executing program 5: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$IPC_SET(r0, 0x1, &(0x7f0000000080)={{0x3, 0xee01, 0xffffffffffffffff, 0x0, 0xee00}}) 07:23:39 executing program 3: syz_mount_image$jfs(&(0x7f0000002640)='jfs\x00', &(0x7f0000002680)='./file0\x00', 0x0, 0x0, &(0x7f0000002f80), 0x0, &(0x7f0000003040)) 07:23:39 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x40081) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045510, &(0x7f0000000040)=0x6) 07:23:39 executing program 0: syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000580)='./file2\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x5) 07:23:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x200000000204a100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f0000000080)='anon_inodefs\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x30) wait4(0x0, 0x0, 0x0, 0x0) 07:23:39 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000004040)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) dup3(r0, r1, 0x0) [ 1028.183893][T26315] Mount JFS Failure: -22 [ 1028.209111][T22507] usb 5-1: new high-speed USB device number 34 using dummy_hcd [ 1028.225658][T26315] jfs_mount failed w/return code = -22 [ 1028.468923][T22507] usb 5-1: Using ep0 maxpacket: 8 [ 1028.589086][T22507] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1028.819126][T22507] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1028.828228][T22507] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1028.837474][T22507] usb 5-1: Product: syz [ 1028.842434][T22507] usb 5-1: Manufacturer: syz [ 1028.847057][T22507] usb 5-1: SerialNumber: syz [ 1028.900466][T22507] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 1029.104202][T10181] usb 5-1: USB disconnect, device number 34 07:23:42 executing program 0: syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000580)='./file2\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x5) 07:23:42 executing program 1: add_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) 07:23:42 executing program 3: r0 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000700)=@nameseq={0x1e, 0x1, 0x3}, 0x10) bind$tipc(r0, 0x0, 0x0) 07:23:42 executing program 5: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000080)={{0x3, 0xee01, 0xffffffffffffffff, 0x0, 0xee00}}) 07:23:42 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x114, 0x114, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x137}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:23:42 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x131, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x11f, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm_detail={0xe4, 0x24, 0x13, 0x0, "555b928fd49aedb18131981ce91725a469f2cfe8ee3340c39298cbb6513b37cfa0bb2ef5245d249da7f8343b701027da3a1113def569124f50ee285e4d3b05b4c4c506e896bee5b58f715d6e5e3e5ea6eac88a1246be30459b236e857a05cb5895a476d1a5ef6bab2c7f1f92c400f3053cc705f5b0b3b583a7390415d00002af8b651fdc9dfa53ea121e8ef3822ac82300000000000000d8690000005eb20200000087d3c0cc5da0d23ac8263e7e1d46f902e14e9db928a0919e7508a39575b1f5c2c44138eab9488ec81a5e27e39fddb7f4ae8d57c7dda3ac7d08328dfb35ea"}]}}}]}}]}}, 0x0) 07:23:42 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={'sha512_mb\x00'}}) [ 1030.964855][T26353] tipc: Can't bind to reserved service type 0 [ 1030.994772][T26356] loop0: detected capacity change from 0 to 264192 07:23:42 executing program 1: timer_create(0x0, 0x0, &(0x7f0000000400)) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, r0+10000000}}, 0x0) timer_gettime(0x0, &(0x7f0000000080)) 07:23:42 executing program 3: r0 = request_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0) request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, r0) 07:23:42 executing program 1: socket(0x15, 0x5, 0x8000) [ 1031.299227][T22507] usb 5-1: new high-speed USB device number 35 using dummy_hcd 07:23:42 executing program 0: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={'sha256-neon\x00'}}) 07:23:42 executing program 3: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dsp1\x00', 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2, 0x11, r0, 0x0) 07:23:43 executing program 1: r0 = socket(0x22, 0x2, 0x2) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', r0) [ 1031.509869][T26373] could not allocate digest TFM handle sha512_mb [ 1031.572589][T26373] could not allocate digest TFM handle sha512_mb [ 1031.578799][T22507] usb 5-1: Using ep0 maxpacket: 8 07:23:43 executing program 5: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, 0x0}, 0x68) [ 1031.666666][T26387] could not allocate digest TFM handle sha256-neon 07:23:43 executing program 1: r0 = socket(0x2, 0x3, 0x1) setsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, 0x0, 0x0) 07:23:43 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) [ 1031.729761][T22507] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1031.743702][T26387] could not allocate digest TFM handle sha256-neon [ 1031.989874][T22507] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1032.002526][T22507] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1032.011305][T22507] usb 5-1: Product: syz [ 1032.015599][T22507] usb 5-1: Manufacturer: syz [ 1032.020866][T22507] usb 5-1: SerialNumber: syz [ 1032.060222][T22507] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 1032.264989][T22508] usb 5-1: USB disconnect, device number 35 07:23:45 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x114, 0x114, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x137}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:23:45 executing program 0: keyctl$dh_compute(0x17, &(0x7f0000000b80), 0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000c80)={'xcbc(aes)\x00'}}) 07:23:45 executing program 5: r0 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000700), 0xf) 07:23:45 executing program 1: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000000), 0x37) 07:23:45 executing program 3: r0 = socket(0x2, 0x5, 0x0) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, 0x0, 0x0) 07:23:45 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x131, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x11f, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm_detail={0xe4, 0x24, 0x13, 0x0, "555b928fd49aedb18131981ce91725a469f2cfe8ee3340c39298cbb6513b37cfa0bb2ef5245d249da7f8343b701027da3a1113def569124f50ee285e4d3b05b4c4c506e896bee5b58f715d6e5e3e5ea6eac88a1246be30459b236e857a05cb5895a476d1a5ef6bab2c7f1f92c400f3053cc705f5b0b3b583a7390415d00002af8b651fdc9dfa53ea121e8ef3822ac82300000000000000d8690000005eb20200000087d3c0cc5da0d23ac8263e7e1d46f902e14e9db928a0919e7508a39575b1f5c2c44138eab9488ec81a5e27e39fddb7f4ae8d57c7dda3ac7d08328dfb35ea"}]}}}]}}]}}, 0x0) 07:23:45 executing program 3: r0 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0xe, 0x4, @tid=r0}, &(0x7f0000000040)) 07:23:45 executing program 5: r0 = socket(0x1e, 0x1, 0x0) ioctl$SIOCPNGETOBJECT(r0, 0x89e0, 0x0) 07:23:45 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000000c0)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000080)={[{@journal_dev={'journal_dev'}}]}) 07:23:45 executing program 0: r0 = socket(0x10, 0x3, 0xa) syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', r0) 07:23:45 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f00000000c0)) 07:23:45 executing program 5: r0 = socket(0xa, 0x3, 0x4) bind$phonet(r0, 0x0, 0x0) [ 1034.349272][T22508] usb 5-1: new high-speed USB device number 36 using dummy_hcd [ 1034.367468][T26448] loop1: detected capacity change from 0 to 512 [ 1034.417172][T26448] EXT4-fs (loop1): mounted filesystem without journal. Opts: journal_dev=0x0000000000000000,,errors=continue. Quota mode: none. [ 1034.589000][T22508] usb 5-1: Using ep0 maxpacket: 8 [ 1034.711165][T22508] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1034.889642][T22508] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1034.898703][T22508] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1034.907528][T22508] usb 5-1: Product: syz [ 1034.912896][T22508] usb 5-1: Manufacturer: syz [ 1034.917516][T22508] usb 5-1: SerialNumber: syz [ 1034.959963][T22508] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 1035.165345][T22382] usb 5-1: USB disconnect, device number 36 07:23:48 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x114, 0x114, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x137}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:23:48 executing program 1: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dsp1\x00', 0x102, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x80045005, 0x0) mmap$dsp(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2, 0x11, r0, 0x0) 07:23:48 executing program 5: r0 = socket(0xa, 0x3, 0x4) setsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, 0x0, 0x0) 07:23:48 executing program 3: fork() connect$pptp(0xffffffffffffffff, 0x0, 0x0) 07:23:48 executing program 0: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp1\x00', 0x0, 0x0) mmap$dsp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x40010, r0, 0x0) 07:23:48 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x131, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x11f, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm_detail={0xe4, 0x24, 0x13, 0x0, "555b928fd49aedb18131981ce91725a469f2cfe8ee3340c39298cbb6513b37cfa0bb2ef5245d249da7f8343b701027da3a1113def569124f50ee285e4d3b05b4c4c506e896bee5b58f715d6e5e3e5ea6eac88a1246be30459b236e857a05cb5895a476d1a5ef6bab2c7f1f92c400f3053cc705f5b0b3b583a7390415d00002af8b651fdc9dfa53ea121e8ef3822ac82300000000000000d8690000005eb20200000087d3c0cc5da0d23ac8263e7e1d46f902e14e9db928a0919e7508a39575b1f5c2c44138eab9488ec81a5e27e39fddb7f4ae8d57c7dda3ac7d08328dfb35ea"}]}}}]}}]}}, 0x0) 07:23:48 executing program 5: timer_create(0x3, 0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x3938700}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, 0x0) 07:23:48 executing program 3: semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000200)=""/184) 07:23:48 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) connect$pptp(r0, 0x0, 0xccd20a617ff3316) 07:23:48 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00', 0xffffffffffffffff) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}]}]}, 0x20}}, 0x0) 07:23:48 executing program 5: socket(0x1e, 0x0, 0x5) [ 1037.469273][T22382] usb 5-1: new high-speed USB device number 37 using dummy_hcd 07:23:49 executing program 0: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f00000001c0)) r1 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000140)=0x7fff) [ 1037.749083][T22382] usb 5-1: Using ep0 maxpacket: 8 [ 1037.880098][T22382] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1038.089111][T22382] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1038.098196][T22382] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1038.107434][T22382] usb 5-1: Product: syz [ 1038.112883][T22382] usb 5-1: Manufacturer: syz [ 1038.117506][T22382] usb 5-1: SerialNumber: syz [ 1038.160591][T22382] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 1038.364726][T10181] usb 5-1: USB disconnect, device number 37 07:23:51 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x0, 0x3, 0x7}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:23:51 executing program 1: ioctl$BTRFS_IOC_SNAP_DESTROY(0xffffffffffffffff, 0x5000940f, &(0x7f0000000040)={{}, "01336970a37b9e62c2498754ba418c554f83665d36e5c5c626f83ee05d2a6049cc8c78c76d4a19524f3bff75eee1bb7f926afb22a0e9033e6049ef55621eeefcb50e6437304f9dde9f05f1acd557df0d2cb62886832be21973e4a53ca5c92ea584bd3c1a158b0e7b4ea764e40d43a53b2b632eb19e63db673b2e79fbe536c9cf2b0fa3c96b7d7209991d483ac6c0213accc8489f1c841120cfb050acc298d57775b5bf98f1336db0e5d14e9a775e1c037c674a4c14f8139a2e3a52796483b93aa85cb70e6bfbac22a057bedc384a990e39b406d7be3388316689cfcd7c838105b5fc1166b3cd866070338ca92e5715e4ffb58025866f247d36f307ac709da6719faa0ebb3c861a363dc1640666ac5a4e7bf5f3392eeec8419a0fd923cf6d72f0d01e2f4cb36fda3cde842cf92d8bef3a7e67ab26aa576c7233c4aeda6d3a0852dc19697d714f62544137095584b86aa0a93f3f9f46f05565d6403109ddb56b683e817d6890d7a0272b969935a6b4dd0c68337ebe5546943f1689e2f089c5707c18e6ca8240d3add061bd9ada95ff7be46866cd578074e144013869cb53d41ae14c31f8707d1f1d2857c187764212dc4dcc11cfacc87900f8f668895e706dd999707f3787c66409298175a85c6f60ce41659240e50a0391397c0cec0d64f865c0aea2043dd0b456eb1b8a15f30a3f9514004796d86b0b470b8d3ed7711466c548bf8a4a456056b236931e0721dc96cbf68dac11ad939097e1400068eb44b0ed4fc1845e4bbcd8f35544d388081c3bf8d405119f0e8778fafb5bd0f87c2fd7312175e54863fb01265542a485bb077181546eafa9f8739971a6365ab45eb075996bd412afe31ae55317af5e94ec4a690bbaeca4deb34d559dc7206a76f76006fea999e0faeb086f98e47a15fed0d2454503e613096b6b44110d195113fcf984fb30f3cd9efea61e538149f3e43e2232e2479775b87c9c5f39900cfdfe2d3f71b7610b082be437d6f44ea05a4c97a115a804fd9f31d5eaa1cb4457fa708e933830fa50095bac627d0d2a57c446b3cd86333288f74220c1e1d4269b6c37d78ce0b60bc9bfe0880bd8bb2cdddbd94fd0316a41b009d75f3d74f0e071e6976ca496d1735345ba7ca840b23739fedca135debf2703c75c1c7e450a59df13a1058c9d41aed1177852db0ed96b2fe77926d345bb30d7f50aced2207e5d494a50f559aee321ff7c6be67f8ecfae679a601a0a0ac41561c74cded1e326ed278881645abd59dbd81bf1912328927b4c4c63a4824f417d104407a44375e2cba929f06c0ada97221c50907bbace99534523a798b56325a570326ce4eefb8329c17afcc2f48e9b20c814dd48543d876527a633a4e21c7e1f9489c7812bcc160bd8824ad65c1291c0ebc72172a898722d01f2d5068d0e1d98601e60dc2144c10f63c08f9988e8677f648067bf40df0a2ce723e27ae9682d821d986ba8010bd0b194663a49bca9cbdbc1e7919ec3469d7255194307cc73d73605932ac5803a792e43250c41999b9e6ec907042cd1d53025e4f407ab4522b142f567efe35d221a66a906598e8d988e7abb223b6a248557127c516b2d8b24a471cd1029fe7616700fafd085a5cbf85a859abf1209b7c4386bc1b0919da052915fed7829790a1e23ed4c44c8937bb471b76258a803a66aca25702ee4f8de8c2e06d2c54804152b74cfaef981570d4fcef9b7201586c9421332875666472b004887c5a6c82b9ef104a8d09d9d93abe0c617008f75cff1c3b09121d7521d1ba21578d4f5328db6baa68b7f14efce8a883f1066ff1c06fa74c60b0247feb1cb6a2ffff41cfd041f79701629e65022eca1c9398a497da37ff55a710ce1fddc5e65aec87af3bd7c3f8f8af46cc6a7d63ffd6e2840613f8c428e64d0f389d9dac7cccd26650c28c60ea5fbcc911bcc938cfb2e7b02d6effabb194ef74282562abff7da3e84928178df1566c8f814bd10c35c98f7b6878dd23e294da90e8b71bb838a1f5d4df6dc914ec11e177e62b51e3be100627665ca0487e38a53d5c56b9cd837e448ac6c277b2325c7146fc1233ea6c1ad2d823dacc893e4dadc6a0e138c62d2642fc104fee769f02f3abb08bbc00585dc21a3b638ec53316d51f4334220e2ec5dd75c0734b845d48f59ba11445df7b2c432c86570ec5c4f0eebaf26ada431af2daf42d2e30b027e9d8885ff0af33f678af713d2655141a7df97bd5c8a323f6ac05ec352caa86f950133f357b75aeef0269a909b656514b1bd8ce642cc35e55c96cf47a03e60d1039ec790822361c22f4c31a7cdcb68a518d1e3ef7395b5fbba7e4b136d7ef0068ccbe35d7ccc12d48bd29c25153045bf7d87bce23b1b8a849a939e8be04c0d0cb75891cf1bcc0b5621f8e9655122ad677fe6020c860efa40ec24f6ca65492826a14a335a2f53f83466b29f6ae8d74c007b374365dbeeaf624b337a3eac3b22de03f489adf0b3df84bc57feefd40db5aba25bf0ea4da65b1397e4c999cc2f430a771fba95bdc7bdd554a3bf30040ada2210f900889f0a22e925b997f811698518d11fbce4307dbaf400a9e5cf5859ad4d15b025deec4635f388ef4f9edcfd0443464faf355bf035120582c0ed3822bc6c1f27220b4574d2fc0369fa8fc3291c20ba3d3ca1d51057bd256cfcce63a739d5970ea00f8f34efcbf12e404ea5d1ebe1152efbc940958157c5f309949111fee660fdd7c45b582a7882544c8fe39170d54971f4828a125a87f2c3d3ffca6d8f9c71884b1aa8f594d824475ef58d183053624b781ed8199af66e6826cdba5f054175998cb6b05913ef0fa53632ec60b76167432f5723ecb10bfa42e902cb7f794b2bad02141eac3669a41aa4f5cc665c76c9b9da53a06be13d14fa5a2f64d1b72794caf47f0059a0f5b99c502c577f2e00e92469c1abddb1e497533bd4a4dafd6af2ad8acbf8bce08d58306ae9ce3fc39d7d506c2e9aad4bbacfaa9206d7c85035b19744e3777bd22170dcdec822f06790fc79e2344fa26b85c135325f00b0856b2fa5ed634e7a4206ebd5afcfb26faab7731f94a01982745656e94213b3f61292c1adec575472d4ec1724b65b5f3a8094e894f12f7cb5461b9e1ce4e8f448a52292d658364fbff7b71dc10a743e2b3f923a3919ce3d09b7c32456ef2bc1f5be4924463aebb48e155474b97c944cab66910c59f70882c22d9fc1abcb4b63322034e923266a72ae704c9f98cdca4fd98b31a3bd7c1ee0290358628d7ff61879cddb5dccc560619babce610bc4bf798cf85971c82424d3f98e07a759073804a480a9372d8945af5b40fc171292e80fc6b8005e7b5a7b7ed7419de4571f3ff783eb65f96d3ab9d5f5c0e29f99445f361ad2c7546b2c01aa355026c52f0ce3d2fc137789fc01813e718c913e582d44c986c8568beb8a1de1096e42afd0a5082860bcc06798fe81e64f76fd45a6871e10b73a58e170e247488985da6ed812ef7d1ba7a0bb0a9f37a34fb24a8598aca71110695f60cf772e47a67d1d241a906d1c7700d6a1db49a8022cd5a8f265a594fcacd7d37820107a8135e5db487d4e0da54a92c68fe41e5260ad3ab0f30e3aaedcd30769a5dda5b07dcd36630f73989838de75fdbaefd72413750227a0c1830c0e49cc2f26d5ea9d7afc91193687d87f1f7ece6ef2fd7fd47de7e89dacdd8bf499bb06e7ed6785ad3160663b3f01145d678912e4ae61907927b541e5b7894deba554fab51fd3c1db24b732d5dcf9c9a830ed41679248eb2d5b4a2a0ac3155c646300fdfd9bf3bead5fef5523e57a2dd21ec6f1bb0415b682dac196c7731aba7348ebfe3910d3c7982e320a45a7d7ac5ee761edecf025535ac31aabf6b74da034e0e4aba4199d3eeeda0fd57380b7f8ac58977c98054d32c6a98aac68f2d4e942dcc62e73f6367b622b77832c913478588b0f3e9881647864ed5622fdffffd9ad4825de7a5b81139a07a7c9d9ccd8f62ef782f59a40fe14f46f7485542519e7d6c37770af36d3bd152eca38267e8fec4501cc92f17661c09e2b8f5106d3b21b242a850fdbc7e9060197ab87aa487728ee26b9efef0a13d2f75ba2ac06d40dcc6336f3bbb5a12a7f71a32a0ea37336806565722f5781e4342276d08594e0a1b942352846b22fb66cbf26e951d264cb4d6009e3a9342a25386d08a0ec6d3577633c98d7c74f375f9035591b5e7b1f925ab2f73451f7a74b8d9c8eef15a9dfeb36e279ba2841571c27fe9014417025c3307331f35b35a01b1f7d5f66a014ccaefcc13320ed07848f6a13cf18cd5c3897dd12a29986960bf4b762b2a174c8d219538810c568200964abc0ee733091d512ee56c8efc59a84fab8b7e9b9f14e717880083f61e25569b72d5b9bec92a96eb587044ec44e128a7f7cbf4204732b8c2324e9f1d9a00a1186db42d4116a998421c0c16ebd4c9fbfe53c67afd25b7ab9822605c22d2394cdb0c34fc59105bb796da50541abf075a4794f93e6a552ae65f7428fae32a2562c6c82ae1f08e9bc1cb921d8c0039639b0ae8aeaa70f86feaff0bfe71b0fcb969cb0d269cd6fdb2b6e4ad4cac6aabb75b1c7d8b8eb9a0115046d7eff06f1e970cb6826b153c1c4f2a3a89466d0ba21ba89434a8248bb1e0586822893732ef0f7295ec97f6db58a868ef9801a8724dbf21d3b1245d565df4077f20b25fda0d29769d28de694bce71c9f7f783be9fdb158465cbf6eda9a69e8de7646ce3b7493df38c3e892c6bf2d72056a25d89fbcf9e7a29c7dd6e64855847e57f764ca7c37454906e2a837c530055f047caff93071226f89ebc999f60e6a985dcf08e64d37a720d37f430e78ab2752afb11d88b8c86393e1a533c44ae52ad56144697db25a2749628f7e5d1fccd03e513c445b402418b7ed0aae3d700fbd6f38dd4c5ed0de5e23b7b022952ebace76d8dee6a00affd6aa6ea72e0b7a75b0383bae0bbe81605da031397ce3f93e754c84d2e47236496b54ff8b9d81d955a5935cebc98f166d5071f603706b9a8d82d1d4e231771d631b1c61ccd1205922c0fdf13618f14e741251ae706b6133e0ffd3d1a402594e987ae2f66f1bd6aa66c707d661f1f5123e09756d5a4f831c0b8fab0fe977c297aa34fb584048f867d3fa20012b58f98dc37e770db04deeb3a48d1c5b699afd511243390168944aab8e031fb38d8d7561517a861a49da3dca88e47c86b498f8ace8bca2d98a69fd00c71da0d2b8f07e6a0e321bc03d402056f454df5c65922dcbc5e5a7c521d182d14a58f4623b2e1dfc4b369f9330dfbfa80993df30f94c09aa709e435f1e60f4f1a973509cdea114c39fcc866dbe6dbf1136ef1dde40efb6aef605d6f0c41f2135a8a36c8e138117148c75d7d7aeaaa66b96715eb535abcc26501efffce1aa80f2983c7290bbfd4143b4ffcbefcb9a41fc84910ad2bcfcc3adc425da2a665c066249e56c51d1abf443bf63e209a8c2dd9a9c096f9c3d32ac16cdc84dbfefa30aa1229111d4a35da6b38ed393c4d8adfe83ed61f3a01cb37cd47fe1b9895385b3cef31c802780673bd0e97c16c7e7fd5131c72e8297ef768b27ba97d745892474a6b2675ac355ef0d8c8c217f8a6b50282b72cd87c5ab57ac7852b1ce9997238875db72acd7c0300e65100eeb896e5997b3d6aa5c7012345e8f1fbac08b5dc9d5ce13a2f1ae38df9a40529071c3a32cd9a019fc2302ba6659dc2732ae2ba182b7a53b0c506148bda211d63f67656e223fee06e6f5a8d36fc23c2d4463e186ec1bb52805a93c01937cab8474d5b01e"}) io_setup(0x0, &(0x7f0000000080)) 07:23:51 executing program 3: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=@hat={'changehat ', 0x4}, 0x1d) 07:23:51 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='keyring\x00', 0x0, &(0x7f0000000080)="fd", 0x1, r0) 07:23:51 executing program 0: r0 = socket(0x18, 0x0, 0x1) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, 0x0, 0x0) 07:23:51 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x141, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12f, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm_detail={0xf4, 0x24, 0x13, 0x0, "555b928fd49aedb18131981ce91725a469f2cfe8ee3340c39298cbb6513b37cfa0bb2ef5245d249da7f8343b701027da3a1113def569124f50ee285e4d3b05b4c4c506e896bee5b58f715d6e5e3e5ea6eac88a1246be30459b236e857a05cb5895a476d1a5ef6bab2c7f1f92c400f3053cc705f5b0b3b583a7390415d00002af8b651fdc9dfa53ea121e8ef3822ac82300000000000000d8690000005eb20200000087d3c0cc5da0d23ac8263e7e1d46f902e14e9db928a0919e7508a39575b1f5c2c44138eab9488ec81a5e27e39fddb7f4ae8d57c7dda3ac7d08328dfb35ea36c6c5508e76b2e627a9a84005920c67"}]}}}]}}]}}, 0x0) 07:23:51 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=@hat={'changehat ', 0x0, 0x5e, ['\x00']}, 0x1e) [ 1040.315083][ T37] audit: type=1400 audit(1617953031.813:41): apparmor="DENIED" operation="change_hat" info="unconfined can not change_hat" error=-1 profile="unconfined" pid=26543 comm="syz-executor.3" 07:23:51 executing program 1: socket(0x10, 0x3, 0x81) 07:23:51 executing program 3: openat$cuse(0xffffffffffffff9c, &(0x7f0000004040)='/dev/cuse\x00', 0x2, 0x0) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmat(r0, &(0x7f0000ffb000/0x1000)=nil, 0x4000) 07:23:51 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(r0, 0x8927, 0x0) 07:23:51 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x0, 0x3, 0x7}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:23:52 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x40081) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x8004550f, 0x0) 07:23:52 executing program 0: r0 = socket(0x18, 0x800, 0x0) read$alg(r0, 0x0, 0x0) 07:23:52 executing program 5: r0 = socket(0x18, 0x0, 0x2) recvmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) [ 1040.486089][T26559] AppArmor: change_hat: Invalid input, NULL hat and NULL magic [ 1040.578895][ T8] usb 5-1: new high-speed USB device number 38 using dummy_hcd 07:23:52 executing program 3: r0 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000700)=@name={0x1e, 0x2, 0x2, {{0x1}}}, 0x10) 07:23:52 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000004040)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000300)={0x28}, 0x28) 07:23:52 executing program 0: r0 = socket(0x22, 0x2, 0x2) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x40080) [ 1040.878893][ T8] usb 5-1: Using ep0 maxpacket: 8 [ 1041.004987][ T8] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1041.221714][ T8] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1041.242348][ T8] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1041.252342][ T8] usb 5-1: Product: syz [ 1041.256533][ T8] usb 5-1: Manufacturer: syz [ 1041.263629][ T8] usb 5-1: SerialNumber: syz [ 1041.310261][ T8] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 1041.515732][ T4840] usb 5-1: USB disconnect, device number 38 07:23:53 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x141, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12f, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm_detail={0xf4, 0x24, 0x13, 0x0, "555b928fd49aedb18131981ce91725a469f2cfe8ee3340c39298cbb6513b37cfa0bb2ef5245d249da7f8343b701027da3a1113def569124f50ee285e4d3b05b4c4c506e896bee5b58f715d6e5e3e5ea6eac88a1246be30459b236e857a05cb5895a476d1a5ef6bab2c7f1f92c400f3053cc705f5b0b3b583a7390415d00002af8b651fdc9dfa53ea121e8ef3822ac82300000000000000d8690000005eb20200000087d3c0cc5da0d23ac8263e7e1d46f902e14e9db928a0919e7508a39575b1f5c2c44138eab9488ec81a5e27e39fddb7f4ae8d57c7dda3ac7d08328dfb35ea36c6c5508e76b2e627a9a84005920c67"}]}}}]}}]}}, 0x0) 07:23:53 executing program 3: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0x1, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="c4259d9a25b1d323f401675ee8ba8d8201438f69b6417bd06063f4ce698ca9cff0d7cfff477da49de63144b4819496d4b52aaffebf012e7b969a0115cdad32ebe50cfa0ac904676200d081d62f0c67b32f0b328064010f88df7e3093d12b91efc7d12c31fd33ef2048679539eed3c8590f3c7d61487b278d72997de1243b67f0baf9fae98317dcc4ad7afc3887f8f5f4056af146ea47c16b12f75486c7b4ceff638e61e4a96570610a57d8b6b60981e2299f118136f410f53e7d3d2d031d3c57", 0xc0, 0xfffffffffffffffc) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r1, r0}, 0x0, 0x0, 0x0) 07:23:53 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) 07:23:53 executing program 1: rt_sigaction(0xb, &(0x7f0000000180)={&(0x7f00000000c0)="0ff6a8c6a9eedb6766460f1bcd66420f5ff1f0810b000001008fc99897bc4069a50000f3abf0318300000000c4e39d7de422c48279798900000080f36c", 0x0, 0x0}, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x8, &(0x7f00000002c0)) 07:23:53 executing program 0: keyctl$dh_compute(0x17, &(0x7f0000000000), 0x0, 0x5f, &(0x7f0000000140)={&(0x7f0000000100)={'ghash-generic\x00'}}) [ 1042.478897][T10181] usb 5-1: new high-speed USB device number 39 using dummy_hcd [ 1042.728925][T10181] usb 5-1: Using ep0 maxpacket: 8 [ 1042.849433][T10181] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1043.049150][T10181] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1043.058232][T10181] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1043.067004][T10181] usb 5-1: Product: syz [ 1043.071759][T10181] usb 5-1: Manufacturer: syz [ 1043.076377][T10181] usb 5-1: SerialNumber: syz [ 1043.122565][T10181] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 1043.325684][ T4840] usb 5-1: USB disconnect, device number 39 07:23:55 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {0x0, 0x0, 0x7}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:23:55 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000100)='/dev/ubi_ctrl\x00') 07:23:55 executing program 3: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x5}, &(0x7f00000000c0), &(0x7f0000000140)={&(0x7f0000000100)={[0x1]}, 0x8}) 07:23:55 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2080, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:23:55 executing program 1: semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000080)) 07:23:55 executing program 1: arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000000c0)) 07:23:55 executing program 5: r0 = socket(0xa, 0x5, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, 0x0) 07:23:55 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x141, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12f, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm_detail={0xf4, 0x24, 0x13, 0x0, "555b928fd49aedb18131981ce91725a469f2cfe8ee3340c39298cbb6513b37cfa0bb2ef5245d249da7f8343b701027da3a1113def569124f50ee285e4d3b05b4c4c506e896bee5b58f715d6e5e3e5ea6eac88a1246be30459b236e857a05cb5895a476d1a5ef6bab2c7f1f92c400f3053cc705f5b0b3b583a7390415d00002af8b651fdc9dfa53ea121e8ef3822ac82300000000000000d8690000005eb20200000087d3c0cc5da0d23ac8263e7e1d46f902e14e9db928a0919e7508a39575b1f5c2c44138eab9488ec81a5e27e39fddb7f4ae8d57c7dda3ac7d08328dfb35ea36c6c5508e76b2e627a9a84005920c67"}]}}}]}}]}}, 0x0) 07:23:55 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x511080, 0x0) 07:23:55 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, 0x0, 0x53) 07:23:55 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x9) 07:23:55 executing program 5: r0 = socket(0x2, 0x3, 0x4) bind$tipc(r0, 0x0, 0x0) [ 1044.348915][T22250] usb 5-1: new high-speed USB device number 40 using dummy_hcd [ 1044.588896][T22250] usb 5-1: Using ep0 maxpacket: 8 [ 1044.709391][T22250] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1044.879333][T22250] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1044.888395][T22250] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1044.897950][T22250] usb 5-1: Product: syz [ 1044.902906][T22250] usb 5-1: Manufacturer: syz [ 1044.907517][T22250] usb 5-1: SerialNumber: syz [ 1044.950607][T22250] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 1045.153574][T22507] usb 5-1: USB disconnect, device number 40 07:23:58 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x1, 0x1000}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:23:58 executing program 1: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000040)={'cmac(twofish)\x00'}}) 07:23:58 executing program 0: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvme-fabrics\x00', 0x0, 0x0) fcntl$getown(r0, 0x9) 07:23:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x20, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 07:23:58 executing program 3: r0 = socket(0x18, 0x0, 0x0) connect$llc(r0, 0x0, 0x38) 07:23:58 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x149, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x137, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm_detail={0xfc, 0x24, 0x13, 0x0, "555b928fd49aedb18131981ce91725a469f2cfe8ee3340c39298cbb6513b37cfa0bb2ef5245d249da7f8343b701027da3a1113def569124f50ee285e4d3b05b4c4c506e896bee5b58f715d6e5e3e5ea6eac88a1246be30459b236e857a05cb5895a476d1a5ef6bab2c7f1f92c400f3053cc705f5b0b3b583a7390415d00002af8b651fdc9dfa53ea121e8ef3822ac82300000000000000d8690000005eb20200000087d3c0cc5da0d23ac8263e7e1d46f902e14e9db928a0919e7508a39575b1f5c2c44138eab9488ec81a5e27e39fddb7f4ae8d57c7dda3ac7d08328dfb35ea36c6c5508e76b2e627a9a84005920c6769b0a9c2fa19d893"}]}}}]}}]}}, 0x0) 07:23:58 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x20000000000001f8, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="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", 0x1f2}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file2\x00', 0x0, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file2\x00', 0x0, 0x0) 07:23:58 executing program 0: pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=@newlink={0x168, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x140, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x130, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x8007}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x20000003}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfffffffa}}]}, @IFLA_VLAN_INGRESS_QOS={0x64, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xa99, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xfff, 0x800}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0x7f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xfffffffc, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcb0, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1, 0xae5f}}]}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}, @IFLA_VLAN_EGRESS_QOS={0x64, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0xffffffff}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x200f3af9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xfff, 0x1ff}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7fffffff, 0x38}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0xffff}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x10001, 0x100}}]}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x168}}, 0x8000) 07:23:58 executing program 5: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000000)={{0x2, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01}}) 07:23:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00'}) 07:23:58 executing program 1: socket(0x26, 0x5, 0xffffffff) [ 1046.860738][T26711] loop3: detected capacity change from 0 to 264192 07:23:58 executing program 0: mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) pipe(&(0x7f00000000c0)) munlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) [ 1046.949356][T22507] usb 5-1: new high-speed USB device number 41 using dummy_hcd [ 1047.189177][T22507] usb 5-1: Using ep0 maxpacket: 8 [ 1047.319888][T22507] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1047.499106][T22507] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1047.508305][T22507] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1047.526796][T22507] usb 5-1: Product: syz [ 1047.531544][T22507] usb 5-1: Manufacturer: syz [ 1047.536692][T22507] usb 5-1: SerialNumber: syz [ 1047.620123][T22507] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 1047.834222][T22250] usb 5-1: USB disconnect, device number 41 07:24:01 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x114, 0x114, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x137}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:24:01 executing program 5: mlock(&(0x7f0000ff0000/0x1000)=nil, 0x1000) munlock(&(0x7f0000ff0000/0x10000)=nil, 0x10000) 07:24:01 executing program 3: mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) pipe(&(0x7f00000000c0)) 07:24:01 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001240), 0x8002, &(0x7f00000012c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'ascii'}}, {@gid={'gid', 0x3d, 0xee00}}, {@errors_remount='errors=remount-ro'}, {@resize_size={'resize'}}], [{@context={'context', 0x3d, 'unconfined_u'}}]}) 07:24:01 executing program 1: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='permhat p'], 0x37) 07:24:01 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x149, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x137, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm_detail={0xfc, 0x24, 0x13, 0x0, "555b928fd49aedb18131981ce91725a469f2cfe8ee3340c39298cbb6513b37cfa0bb2ef5245d249da7f8343b701027da3a1113def569124f50ee285e4d3b05b4c4c506e896bee5b58f715d6e5e3e5ea6eac88a1246be30459b236e857a05cb5895a476d1a5ef6bab2c7f1f92c400f3053cc705f5b0b3b583a7390415d00002af8b651fdc9dfa53ea121e8ef3822ac82300000000000000d8690000005eb20200000087d3c0cc5da0d23ac8263e7e1d46f902e14e9db928a0919e7508a39575b1f5c2c44138eab9488ec81a5e27e39fddb7f4ae8d57c7dda3ac7d08328dfb35ea36c6c5508e76b2e627a9a84005920c6769b0a9c2fa19d893"}]}}}]}}]}}, 0x0) 07:24:01 executing program 3: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/adsp1\x00', 0x401, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(r0, 0x40045010, &(0x7f0000000080)=0xffff7fff) [ 1049.784817][T26753] AppArmor: change_hat: Invalid input 'p' [ 1049.824127][T26754] jfs: Unrecognized mount option "context=unconfined_u" or missing value 07:24:01 executing program 1: syz_emit_ethernet(0x12, &(0x7f0000000040)={@broadcast, @remote}, 0x0) 07:24:01 executing program 5: mlock(&(0x7f0000ff1000/0x1000)=nil, 0x1000) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) mlock(&(0x7f0000ff2000/0x3000)=nil, 0x3000) mlock(&(0x7f0000ff8000/0x2000)=nil, 0x2000) 07:24:01 executing program 0: mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) munlock(&(0x7f0000ffa000/0x1000)=nil, 0x1000) 07:24:01 executing program 1: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000040)={{0x0, 0x0, 0x0, 0xffffffffffffffff}}) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) munlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 07:24:01 executing program 5: socket$inet6(0x18, 0x4003, 0x0) [ 1050.088951][ T8] usb 5-1: new high-speed USB device number 42 using dummy_hcd [ 1050.388996][ T8] usb 5-1: Using ep0 maxpacket: 8 [ 1050.531594][ T8] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1050.699046][ T8] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1050.708199][ T8] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1050.717940][ T8] usb 5-1: Product: syz [ 1050.722948][ T8] usb 5-1: Manufacturer: syz [ 1050.727569][ T8] usb 5-1: SerialNumber: syz [ 1050.770263][ T8] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 1050.974137][ T8] usb 5-1: USB disconnect, device number 42 07:24:04 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x114, 0x114, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x137}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:24:04 executing program 1: select(0x40, &(0x7f0000000000)={0x7}, &(0x7f0000000040)={0x5}, 0x0, 0x0) 07:24:04 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x224902, 0x0) 07:24:04 executing program 5: mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) munlock(&(0x7f0000ff8000/0x4000)=nil, 0x4000) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) 07:24:04 executing program 3: open$dir(&(0x7f0000001680)='./file0\x00', 0x200, 0x0) lchown(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8, 0x110) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpgid(0x0) getegid() setsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, 0x0, 0x0) 07:24:04 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x149, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x137, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm_detail={0xfc, 0x24, 0x13, 0x0, "555b928fd49aedb18131981ce91725a469f2cfe8ee3340c39298cbb6513b37cfa0bb2ef5245d249da7f8343b701027da3a1113def569124f50ee285e4d3b05b4c4c506e896bee5b58f715d6e5e3e5ea6eac88a1246be30459b236e857a05cb5895a476d1a5ef6bab2c7f1f92c400f3053cc705f5b0b3b583a7390415d00002af8b651fdc9dfa53ea121e8ef3822ac82300000000000000d8690000005eb20200000087d3c0cc5da0d23ac8263e7e1d46f902e14e9db928a0919e7508a39575b1f5c2c44138eab9488ec81a5e27e39fddb7f4ae8d57c7dda3ac7d08328dfb35ea36c6c5508e76b2e627a9a84005920c6769b0a9c2fa19d893"}]}}}]}}]}}, 0x0) 07:24:04 executing program 1: socket$unix(0x1, 0x2, 0x0) select(0x40, &(0x7f0000001140), &(0x7f0000001180)={0x9}, 0x0, 0x0) 07:24:04 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) getsockname$unix(r0, &(0x7f0000000000), &(0x7f0000001040)=0x1002) 07:24:04 executing program 0: mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) munlock(&(0x7f0000ff0000/0x10000)=nil, 0x10000) 07:24:04 executing program 3: keyctl$update(0x2, 0x0, &(0x7f0000000100)="86", 0x1) 07:24:04 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x2271, 0x400000) 07:24:04 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x227b, 0x400000) [ 1053.128931][T22250] usb 5-1: new high-speed USB device number 43 using dummy_hcd [ 1053.369033][T22250] usb 5-1: Using ep0 maxpacket: 8 [ 1053.489570][T22250] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1053.669613][T22250] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1053.678711][T22250] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1053.707533][T22250] usb 5-1: Product: syz [ 1053.713059][T22250] usb 5-1: Manufacturer: syz [ 1053.717689][T22250] usb 5-1: SerialNumber: syz [ 1053.760511][T22250] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 1053.963966][T22508] usb 5-1: USB disconnect, device number 43 [ 1054.269776][ T3251] ieee802154 phy0 wpan0: encryption failed: -22 [ 1054.276218][ T3251] ieee802154 phy1 wpan1: encryption failed: -22 07:24:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x114, 0x114, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x137}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:24:07 executing program 5: add_key$keyring(&(0x7f0000000580)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000300)='big_key\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) 07:24:07 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_GETPARAMS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 07:24:07 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_security(0x11, r0, 0x0, 0x0) 07:24:07 executing program 0: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r0) add_key(&(0x7f0000000180)='rxrpc_s\x00', 0x0, 0x0, 0x0, r1) 07:24:07 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x14d, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x13b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm_detail={0x100, 0x24, 0x13, 0x0, "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"}]}}}]}}]}}, 0x0) 07:24:07 executing program 3: request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x0}, 0x0, 0x0) 07:24:07 executing program 5: io_setup(0x8851, &(0x7f0000000040)) 07:24:07 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x0, 0x0) io_setup(0x8851, &(0x7f0000000040)) 07:24:07 executing program 0: add_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) 07:24:07 executing program 3: symlinkat(&(0x7f0000000180)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00') open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 07:24:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xa0, 0x0) [ 1056.310555][ T9739] usb 5-1: new high-speed USB device number 44 using dummy_hcd [ 1056.569541][ T9739] usb 5-1: Using ep0 maxpacket: 8 [ 1056.709655][ T9739] usb 5-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 1056.901451][ T9739] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1056.914108][ T9739] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1056.933745][ T9739] usb 5-1: Product: syz [ 1056.938093][ T9739] usb 5-1: Manufacturer: syz [ 1056.945312][ T9739] usb 5-1: SerialNumber: syz [ 1056.945383][T26878] EXT4-fs (sda1): re-mounted. Opts: (null). Quota mode: none. [ 1056.990357][ T9739] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 1057.195665][ T9739] usb 5-1: USB disconnect, device number 44 07:24:10 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0x1000}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:24:10 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_mreqn(r0, 0x0, 0x17, &(0x7f0000001500)={@loopback, @dev}, 0xc) 07:24:10 executing program 5: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) 07:24:10 executing program 3: syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x58bf, 0x24041) 07:24:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xa0, 0x0) 07:24:10 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x14d, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x13b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm_detail={0x100, 0x24, 0x13, 0x0, "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"}]}}}]}}]}}, 0x0) 07:24:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="dfbc58ef6edd8c56a5017ead7279f601", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000002e00)=[{0x0, 0x0, &(0x7f0000002380)=[{&(0x7f0000000040)="51c8e408e8973447f8069220aefb7ee7", 0x10}], 0x1}], 0x1, 0x0) 07:24:10 executing program 5: r0 = perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r1, r0, 0x0, 0x0, 0x0}, 0x30) [ 1059.193658][T26906] EXT4-fs (sda1): re-mounted. Opts: (null). Quota mode: none. 07:24:10 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e09521e92a020000000c0024", 0xf, 0x400}, {&(0x7f0000000240)="80ad453195447449558cdb20058d948235e2b3533c1412231f", 0x19, 0x480}], 0x0, &(0x7f0000000040)) 07:24:10 executing program 1: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$sysv(&(0x7f0000000440)='sysv\x00', &(0x7f0000000480)='.\x00', 0x0, 0x2, &(0x7f0000004780)=[{0x0}, {0x0}], 0x2, &(0x7f0000004800)={[{'obj_role'}, {'upgrade'}, {'fsmagic'}], [{@obj_user={'obj_user', 0x3d, '$+'}}]}) getsockopt(0xffffffffffffffff, 0x200000000114, 0x2716, &(0x7f0000c35fff)=""/1, 0x0) 07:24:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="dfbc58ef6edd8c56a5017ead7279f601", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000002e00)=[{0x0, 0x0, &(0x7f0000002380)=[{&(0x7f0000000040)="51c8e408e8973447f8069220aefb7ee7", 0x10}], 0x1}], 0x1, 0x0) [ 1059.389441][T22508] usb 5-1: new high-speed USB device number 45 using dummy_hcd [ 1059.421818][T26926] loop0: detected capacity change from 0 to 4 07:24:10 executing program 5: syz_genetlink_get_family_id$l2tp(&(0x7f00000060c0)='l2tp\x00', 0xffffffffffffffff) [ 1059.465750][T26926] BUG: spinlock bad magic on CPU#0, syz-executor.0/26926 [ 1059.473151][T26926] lock: 0xffff8880b9c31d60, .magic: 00000000, .owner: /-1, .owner_cpu: 0 [ 1059.482311][T26926] CPU: 0 PID: 26926 Comm: syz-executor.0 Not tainted 5.12.0-rc6-next-20210408-syzkaller #0 [ 1059.492318][T26926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1059.503089][T26926] Call Trace: [ 1059.506374][T26926] dump_stack+0x141/0x1d7 [ 1059.510758][T26926] do_raw_spin_lock+0x216/0x2b0 [ 1059.515717][T26926] ? rwlock_bug.part.0+0x90/0x90 [ 1059.520688][T26926] ? alloc_pages+0x194/0x2a0 [ 1059.525632][T26926] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1059.531247][T26926] erofs_pcpubuf_growsize+0x36f/0x620 [ 1059.536715][T26926] ? erofs_put_pcpubuf+0xa0/0xa0 [ 1059.541932][T26926] ? mark_page_accessed+0x273/0x1ad0 [ 1059.547297][T26926] z_erofs_load_lz4_config+0x1ef/0x3e0 [ 1059.552799][T26926] erofs_fc_fill_super+0xe84/0x1d10 [ 1059.558020][T26926] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 1059.563769][T26926] ? set_blocksize+0x1c1/0x3b0 [ 1059.568570][T26926] get_tree_bdev+0x440/0x760 [ 1059.573246][T26926] ? trace_event_raw_event_erofs_readpage+0x5a0/0x5a0 [ 1059.580045][T26926] vfs_get_tree+0x89/0x2f0 [ 1059.584478][T26926] path_mount+0x132a/0x1fa0 [ 1059.589016][T26926] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 1059.595291][T26926] ? strncpy_from_user+0x2a0/0x3e0 [ 1059.600470][T26926] ? finish_automount+0xaf0/0xaf0 [ 1059.605509][T26926] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 1059.611767][T26926] ? getname_flags.part.0+0x1dd/0x4f0 [ 1059.617161][T26926] __x64_sys_mount+0x27f/0x300 [ 1059.621939][T26926] ? copy_mnt_ns+0xae0/0xae0 [ 1059.626561][T26926] ? syscall_enter_from_user_mode+0x27/0x70 [ 1059.632498][T26926] do_syscall_64+0x2d/0x70 [ 1059.636930][T26926] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1059.642839][T26926] RIP: 0033:0x46797a [ 1059.646745][T26926] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1059.666373][T26926] RSP: 002b:00007f863f043fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1059.674802][T26926] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 1059.682783][T26926] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f863f044000 [ 1059.690765][T26926] RBP: 00007f863f044040 R08: 00007f863f044040 R09: 0000000020000000 [ 1059.698747][T26926] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1059.706731][T26926] R13: 0000000020000100 R14: 00007f863f044000 R15: 0000000020000040 [ 1059.725702][T26929] VFS: unable to find oldfs superblock on device loop1 [ 1059.736883][T26926] erofs: (device loop0): erofs_read_inode: unsupported i_format 44416 of nid 36 [ 1059.795533][T26938] VFS: unable to find oldfs superblock on device loop1 [ 1059.797065][T26926] loop0: detected capacity change from 0 to 4 [ 1059.828937][T26926] erofs: (device loop0): erofs_read_inode: unsupported i_format 44416 of nid 36 [ 1059.859110][T22508] usb 5-1: Using ep0 maxpacket: 8 [ 1059.989455][T22508] usb 5-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 1060.188914][T22508] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1060.198009][T22508] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1060.206423][T22508] usb 5-1: Product: syz [ 1060.210895][T22508] usb 5-1: Manufacturer: syz [ 1060.215540][T22508] usb 5-1: SerialNumber: syz [ 1060.259905][T22508] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 1060.468214][T22507] usb 5-1: USB disconnect, device number 45 07:24:13 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x0, 0x1000}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:24:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="dfbc58ef6edd8c56a5017ead7279f601", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000002e00)=[{0x0, 0x0, &(0x7f0000002380)=[{&(0x7f0000000040)="51c8e408e8973447f8069220aefb7ee7", 0x10}], 0x1}], 0x1, 0x0) 07:24:13 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_mreqn(r0, 0x0, 0x5, 0x0, 0x0) 07:24:13 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @l2tp={0x2, 0x0, @loopback}, @in={0x2, 0x0, @dev}, @qipcrtr, 0x7}) 07:24:13 executing program 0: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/timer\x00', 0x0) 07:24:13 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x14d, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x13b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm_detail={0x100, 0x24, 0x13, 0x0, "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"}]}}}]}}]}}, 0x0) 07:24:13 executing program 1: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 07:24:13 executing program 5: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) 07:24:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="dfbc58ef6edd8c56a5017ead7279f601", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000002e00)=[{0x0, 0x0, &(0x7f0000002380)=[{&(0x7f0000000040)="51c8e408e8973447f8069220aefb7ee7", 0x10}], 0x1}], 0x1, 0x0) 07:24:13 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000020000000000010001000004"], &(0x7f0000000040)=""/211, 0x32, 0xd3, 0x8}, 0x20) 07:24:13 executing program 1: openat$vicodec0(0xffffffffffffff9c, &(0x7f00000048c0)='/dev/video36\x00', 0x2, 0x0) 07:24:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="dfbc58ef6edd8c56a5017ead7279f601", 0x10) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002e00)=[{0x0, 0x0, &(0x7f0000002380)=[{&(0x7f0000000040)="51c8e408e8973447f8069220aefb7ee7", 0x10}], 0x1}], 0x1, 0x0) [ 1062.435233][T26994] BPF:[1] Invalid name_offset:65536 [ 1062.443195][T26995] BPF:[1] Invalid name_offset:65536 [ 1062.509107][ T8] usb 5-1: new high-speed USB device number 46 using dummy_hcd [ 1062.798878][ T8] usb 5-1: Using ep0 maxpacket: 8 [ 1062.948946][ T8] usb 5-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 1063.138977][ T8] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1063.148095][ T8] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1063.156812][ T8] usb 5-1: Product: syz [ 1063.161097][ T8] usb 5-1: Manufacturer: syz [ 1063.165744][ T8] usb 5-1: SerialNumber: syz [ 1063.209888][ T8] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 1063.423562][T22507] usb 5-1: USB disconnect, device number 46 07:24:16 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x0, 0x1000}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:24:16 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_mreqn(r0, 0x0, 0x25, &(0x7f0000001500)={@loopback, @dev}, 0xc) 07:24:16 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_mreqn(r0, 0x0, 0xc, 0x0, 0x0) 07:24:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="dfbc58ef6edd8c56a5017ead7279f601", 0x10) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002e00)=[{0x0, 0x0, &(0x7f0000002380)=[{&(0x7f0000000040)="51c8e408e8973447f8069220aefb7ee7", 0x10}], 0x1}], 0x1, 0x0) 07:24:16 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_mreqn(r0, 0x0, 0x1a, &(0x7f0000001500)={@loopback, @dev}, 0xc) 07:24:16 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x14f, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x13d, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm_detail={0x102, 0x24, 0x13, 0x0, "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"}]}}}]}}]}}, 0x0) 07:24:16 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_mreqn(r0, 0x0, 0x11, &(0x7f0000001500)={@loopback, @dev}, 0xc) 07:24:16 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @l2tp={0x2, 0x0, @loopback}, @in={0x2, 0x0, @dev}, @qipcrtr, 0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='batadv_slave_1\x00'}) 07:24:16 executing program 5: syz_mount_image$nilfs2(&(0x7f0000000000)='nilfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="0200000000003434180100007a4a7934d9d44b9a000000003f00000000000000000010000000000004000000000000001000000005000000010000000000000004000000000000000000000000000000e003000000000000561b675f00000000571b675f00000000571b675f000000000100320000000100561b675f00000000004eed0000000000000000000b00000080002000c0001000dadd32bf8764466dbb0c25de8a84ef61", 0xa8, 0x400}], 0x0, &(0x7f0000000040)={[], [{@defcontext={'defcontext', 0x3d, 'root'}}]}) 07:24:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="dfbc58ef6edd8c56a5017ead7279f601", 0x10) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002e00)=[{0x0, 0x0, &(0x7f0000002380)=[{&(0x7f0000000040)="51c8e408e8973447f8069220aefb7ee7", 0x10}], 0x1}], 0x1, 0x0) 07:24:16 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_mreqn(r0, 0x0, 0x16, 0x0, 0x0) 07:24:17 executing program 1: setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x0, 0x0, 0xffffff89) [ 1065.462879][T27041] loop5: detected capacity change from 0 to 4 [ 1065.473256][T27041] NILFS (loop5): unable to read secondary superblock (blocksize = 1024) [ 1065.483634][T27041] NILFS (loop5): broken superblock, retrying with spare superblock (blocksize = 1024) [ 1065.494007][T27041] NILFS (loop5): unrecognized mount option "defcontext=root" [ 1065.569808][T27041] loop5: detected capacity change from 0 to 4 [ 1065.577430][T27041] NILFS (loop5): unable to read secondary superblock (blocksize = 1024) [ 1065.587216][T27041] NILFS (loop5): broken superblock, retrying with spare superblock (blocksize = 1024) [ 1065.597391][T27041] NILFS (loop5): unrecognized mount option "defcontext=root" [ 1065.629306][T22508] usb 5-1: new high-speed USB device number 47 using dummy_hcd [ 1065.888912][T22508] usb 5-1: Using ep0 maxpacket: 8 [ 1066.008909][T22508] usb 5-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 1066.179480][T22508] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1066.188559][T22508] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1066.197010][T22508] usb 5-1: Product: syz [ 1066.201630][T22508] usb 5-1: Manufacturer: syz [ 1066.206233][T22508] usb 5-1: SerialNumber: syz [ 1066.249737][T22508] cdc_ether 5-1:1.0: invalid descriptor buffer length [ 1066.256704][T22508] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 1066.454309][ T8] usb 5-1: USB disconnect, device number 47 07:24:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0xb, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) geteuid() ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xfff, 0x0, &(0x7f0000000180)}) 07:24:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000002e00)=[{0x0, 0x0, &(0x7f0000002380)=[{&(0x7f0000000040)="51c8e408e8973447f8069220aefb7ee7", 0x10}], 0x1}], 0x1, 0x0) 07:24:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000280)='/dev/adsp1\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 07:24:19 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_mreqn(r0, 0x0, 0xa, &(0x7f0000001500)={@loopback, @dev}, 0xc) 07:24:19 executing program 5: syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x4, 0x3284c0) 07:24:19 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x14f, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x13d, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm_detail={0x102, 0x24, 0x13, 0x0, "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"}]}}}]}}]}}, 0x0) 07:24:19 executing program 1: socketpair(0x18, 0x0, 0x34, &(0x7f0000000000)) 07:24:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={0x0}}, 0x15) 07:24:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$l2tp(&(0x7f00000060c0)='l2tp\x00', 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 07:24:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000002e00)=[{0x0, 0x0, &(0x7f0000002380)=[{&(0x7f0000000040)="51c8e408e8973447f8069220aefb7ee7", 0x10}], 0x1}], 0x1, 0x0) 07:24:20 executing program 0: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f00000003c0)={0xffffffffffffffff}, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000540)='./file0\x00', 0x40000801) syz_mount_image$fuse(&(0x7f00000018c0)='fuse\x00', &(0x7f0000001900)='./file0\x00', 0x0, 0x0, 0x0, 0x449, &(0x7f0000003980)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@smackfsdef={'smackfsdef', 0x3d, '}%^,'}}]}}) 07:24:20 executing program 1: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tcp_mem(0xffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) [ 1068.625369][T27107] fuse: Unknown parameter 'smackfsdef' [ 1068.646174][T27108] fuse: Unknown parameter 'smackfsdef' [ 1068.708944][ T8] usb 5-1: new high-speed USB device number 48 using dummy_hcd [ 1068.968973][ T8] usb 5-1: Using ep0 maxpacket: 8 [ 1069.128973][ T8] usb 5-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 1069.319274][ T8] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1069.328405][ T8] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1069.338194][ T8] usb 5-1: Product: syz [ 1069.342538][ T8] usb 5-1: Manufacturer: syz [ 1069.347174][ T8] usb 5-1: SerialNumber: syz [ 1069.389630][ T8] cdc_ether 5-1:1.0: invalid descriptor buffer length [ 1069.396580][ T8] cdc_ether: probe of 5-1:1.0 failed with error -22