m 0: unshare(0x20600) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x0) 16:10:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x16, &(0x7f0000000000), 0x4) 16:10:23 executing program 1: select(0x40, &(0x7f0000000280), 0x0, &(0x7f0000000380)={0x3}, &(0x7f00000003c0)={0x0, 0x2710}) 16:10:23 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000500)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 16:10:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f001fffff0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x5, 0x0, &(0x7f0000000080)=0x4) 16:10:23 executing program 5: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, r0) 16:10:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:23 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) unshare(0x20600) 16:10:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00e0ffff0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:23 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) mmap$usbmon(&(0x7f0000ff9000/0x4000)=nil, 0x7fffdf006000, 0x0, 0x13, r0, 0x0) 16:10:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg(r0, &(0x7f0000004040)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000780)=@nl=@proc={0x10, 0x0, 0x25dfdbfd}, 0x80, 0x0}}], 0x2, 0x0) 16:10:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000f01000000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x30, 0x8, 0x0, 0x1, [{0x2c, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}]}, 0x4c}}, 0x0) 16:10:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="80000000", @ANYRES16=r1, @ANYBLOB="0100000000000000000001000000640008806000008014000400020000000000000000000000000000002408020050bd7adc55e6515adc2e32e9c92967c635b9bdc9bb41ffc1d9f9466f6371644324000100975c9d81c983c8209ee781254b899f8ed925ae9f0923c23c62f53c57cdbf691c08000100", @ANYRES32=r3], 0x80}}, 0x0) 16:10:23 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x200002, 0x0) 16:10:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f07eeffff0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:23 executing program 5: r0 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_gettime(0x2, &(0x7f0000000080)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f00000000c0)={{r1, r2+10000000}, {0x0, r3+10000000}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}}, 0x0) 16:10:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655ffffbffff0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:23 executing program 5: socketpair(0x2c, 0x3, 0x0, &(0x7f0000000280)) 16:10:23 executing program 1: r0 = syz_open_dev$evdev(0xfffffffffffffffc, 0x0, 0x80040) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) 16:10:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x80, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x64, 0x8, 0x0, 0x1, [{0x60, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @private}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "50bd7adc55e6515adc2e32e9c92967c635b9bdc9bb41ffc1d9f9466f63716443"}, @WGPEER_A_PUBLIC_KEY={0x48, 0x1, @a_g}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}]}, 0x80}}, 0x0) 16:10:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655ff9fdffff0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000001101000000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x68, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x4c, 0x8, 0x0, 0x1, [{0x48, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x20, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}]}, 0x68}}, 0x0) 16:10:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000004600)=[{{&(0x7f0000000040)=@abs, 0x6e, 0x0}}], 0x1, 0x0) 16:10:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655ffdfdffff0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:24 executing program 1: pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x2}, 0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={[0x3bb]}, 0x8}) 16:10:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000001201000000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x108, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}, @WGDEVICE_A_FWMARK={0x8}, @WGDEVICE_A_PEERS={0xb8, 0x8, 0x0, 0x1, [{0xb4, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x48, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @remote}}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x76}}]}]}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "50bd7adc55e6515adc2e32e9c92967c635b9bdc9bb41ffc1d9f9466f63716443"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @private2}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}]}, 0x108}}, 0x0) 16:10:24 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x40044590, &(0x7f0000000080)=""/124) 16:10:24 executing program 1: io_setup(0x8, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x92832, 0xffffffffffffffff, 0x8000000) 16:10:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f7fffffff0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:24 executing program 5: timer_create(0x7, 0x0, &(0x7f0000000180)) timer_settime(0x0, 0x1, &(0x7f0000000240)={{}, {0x77359400}}, 0x0) 16:10:24 executing program 0: syz_open_dev$evdev(&(0x7f0000000000), 0xd8, 0x418182) 16:10:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f85ffffff0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:24 executing program 3: syz_mount_image$tmpfs(&(0x7f0000006a00), &(0x7f0000006a40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000006ac0)={[{@nr_blocks={'nr_blocks', 0x2c, [0x30]}}]}) 16:10:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @empty}}}}) 16:10:24 executing program 1: syz_mount_image$tmpfs(&(0x7f0000006a00), &(0x7f0000006a40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000006ac0)) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/156) 16:10:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f8cffffff0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, 0x0) 16:10:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x2f, 0x0, @rand_addr, @empty, {[@generic={0x0, 0x8, "9b2e4593de31"}, @ssrr={0x89, 0xf, 0x0, [@local, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x7, 0x0, [@multicast1]}, @timestamp={0x44, 0x14, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0]}, @ssrr={0x89, 0xb, 0x0, [@rand_addr, @broadcast]}]}}}}}) 16:10:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) [ 1349.912608][T30322] tmpfs: Unknown parameter 'nr_blocks,0' [ 1349.921816][T30322] tmpfs: Unknown parameter 'nr_blocks,0' 16:10:24 executing program 1: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "4c5755c48c57f78266bdb42c264ba89b0920bf800e0001684c0ba639687f83d54c10656bff8c85c0e9213de0ebdd4363eeb0150fef0d85ef1b56d9b3ce2a824b"}, 0x48, 0xfffffffffffffffd) 16:10:24 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000040)={&(0x7f0000000380)={0x1e84, 0x12, 0x0, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x4}, @INET_DIAG_REQ_BYTECODE={0xbd, 0x1, "cd2eee8a62dfe618f7bedcd2df02c0a4145aea3c0f6d6e510fda58e5cbb710afe445af4a15ad355454c37be1b7bd25ec5ef72819d1b21598e612c8ae2265713bd80c257040ed13edac6615c49fbd147b4eb5bd84efa988c7d74fd7e04afa569bcc874518e48853e054234e0da77df711f154775e0e77fdd31cedb6c94e4eaadfb495898dc219c0c9579ff65a7704cc55f0b2eb69b78703cc1924dcf64e5f764ce802396900ee1240d97bf3f3ddf09b8afe12c642ab25966802"}, @INET_DIAG_REQ_BYTECODE={0x1001, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0xb9, 0x1, "145a907509ebe01bd08ad3267010ea3746b699bff325427515cc9da881b3bec76709b1fa130949715d12e46051674b03b5f525acf5bb00f9ab4f3a79a0d426b679a316e1bfd8219bc3bdd77b6ef8492c5f01117310535ef05f4c79c5ac367d71a74a1d3f70591d38cde7b1dbbff95372a987499367c5eee2396cca9b0fb445deaf3839f9d0bb6f65a76394143d6fb8a32af61c15d81ab1be4a132f48e98e79f82cb7acdf819e65f6fe530bcba6f2323028941d2485"}, @INET_DIAG_REQ_BYTECODE={0xe5, 0x1, "5501096e7432dfabc623d17dca202e6f68ab0b5746a968ca95c54ee5e1c5b8c212911fb778abe9ef1b1ae0474391bc067645bd018331390252fe591eb6acd11d6ce50a4f8b33e638d6c35bf8ffb4dedc8a9b0c3be1d899e1df553c8aa1314ba41994fc69da2db375419c6bdf6c3706b4f00617006aa10617229771fee135da974daa0f40e35ce37314aa6233c1e2cc4149a69f8344596f5119313993bdc0f7b43aa08f32380dbb5168ae409b00a2878cf04ed77473855d56fa460ac7229da2d856b8e2ad665848285928671d06f06c45424854febdb8d20ee29d6dcbc4b2dfd3f5"}, @INET_DIAG_REQ_BYTECODE={0xbc9, 0x1, "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"}]}, 0x1e84}}, 0x0) 16:10:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655fdaffffff0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:24 executing program 0: syz_mount_image$ext4(&(0x7f000000dac0)='ext4\x00', &(0x7f000000db00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 16:10:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:24 executing program 5: r0 = fork() ptrace$peeksig(0x4209, r0, 0x0, 0x0) 16:10:24 executing program 3: io_setup(0x7a1, &(0x7f0000000100)) io_setup(0x2, &(0x7f0000000000)=0x0) io_setup(0x42, &(0x7f0000000040)) io_destroy(r0) 16:10:24 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) sendmmsg$unix(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 16:10:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655fe2ffffff0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:24 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000024c0)={0x0, 0x0, 0x0}, 0x2002) 16:10:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x5, &(0x7f0000000040)=0xf6a, 0x4) 16:10:24 executing program 1: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2, 0x92832, 0xffffffffffffffff, 0x8000000) 16:10:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655ff0ffffff0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655ff6ffffff0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:24 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x7ffffffff000, 0x0, 0x10, r0, 0x0) 16:10:24 executing program 5: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000040)={0xf}, 0xf) write$P9_RREAD(r0, 0x0, 0xe) 16:10:24 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000004840), 0x0, 0x0) waitid$P_PIDFD(0x3, r0, 0x0, 0x8, 0x0) 16:10:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000002e01000000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655ffbffffff0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:25 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x70, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x54, 0x8, 0x0, 0x1, [{0x50, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x20, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}]}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x1ff}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}]}, 0x70}, 0x1, 0x0, 0x0, 0x40000}, 0x2004844) 16:10:25 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000004840), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) 16:10:25 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(r0, &(0x7f0000002940)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 16:10:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$AUDIT_GET(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0, 0xfffffdf2}, 0x8}, 0x40c0) 16:10:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655ffeffffff0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000c0ed000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xd, 0x0, 0x2b) 16:10:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x2}]}, 0x1c}}, 0x0) 16:10:25 executing program 5: r0 = timerfd_create(0x8, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timerfd_settime(r0, 0x0, &(0x7f00000000c0)={{}, {0x0, r1+10000000}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}}, 0x0) 16:10:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000004801000000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:25 executing program 0: unshare(0x20600) 16:10:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000010001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:25 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000004840), 0x0, 0x0) io_uring_register$IORING_REGISTER_PROBE(r0, 0x8, 0x0, 0x0) 16:10:25 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) 16:10:25 executing program 5: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0), 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000002440)=[{0x0, 0x0, 0xffffffff}, {&(0x7f0000001400)="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", 0x1000}], 0x0, 0x0) 16:10:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000006001000000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x18, 0x0, &(0x7f0000000080)) 16:10:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000020001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x3, 0x0, &(0x7f0000000080)) 16:10:25 executing program 1: pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x80000001}, &(0x7f00000001c0)={0x2}, &(0x7f0000000200)={0x7}, &(0x7f0000000240)={0x0, 0x3938700}, 0x0) 16:10:25 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) 16:10:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:25 executing program 5: setresuid(0xee00, 0x0, 0x0) r0 = getuid() r1 = getuid() setresuid(0xee01, r0, r1) setresuid(r0, 0x0, 0x0) 16:10:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000040001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x5c, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x40, 0x8, 0x0, 0x1, [{0x3c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @private}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x300, @a_g}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}]}, 0x5c}}, 0x0) 16:10:25 executing program 3: umount2(&(0x7f00000002c0)='./file0/../file0\x00', 0x0) 16:10:25 executing program 0: add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffa) 16:10:25 executing program 1: select(0xfffffffffffffe5c, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x2710}) 16:10:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000140001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:25 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x0, "aa5564a6a5a7047c681bd84d19ea8b35d613d4dd72942e17ad81581d1051b3537214be86b02683f9cc0a6cf73714b9682030b6defbe0f1a2bb6b534b6f08e7f3"}, 0x48, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) 16:10:25 executing program 5: unshare(0x20600) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, 0x0, 0x0) 16:10:25 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000006a00), &(0x7f0000006a40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000006ac0)) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00') 16:10:25 executing program 1: r0 = timerfd_create(0x8, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{}, {0x0, r1+10000000}}, 0x0) 16:10:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:25 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000), 0x2, 0x0) 16:10:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000ffffe00001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:25 executing program 0: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_CQM(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)={0x20, r0, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_CQM={0x8, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_THOLD={0x4}]}, @NL80211_ATTR_CQM={0x4}]}, 0x20}}, 0x0) 16:10:25 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_MPP(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x40, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x64}}, 0x0) 16:10:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:25 executing program 1: unshare(0x20600) r0 = timerfd_create(0x8, 0x0) clock_gettime(0x2, &(0x7f0000000080)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f00000000c0)={{}, {0x0, r1+10000000}}, 0x0) 16:10:25 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x5452, &(0x7f0000000080)=""/124) 16:10:25 executing program 5: openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) 16:10:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000101000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:25 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x80, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x64, 0x8, 0x0, 0x1, [{0x60, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @private}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "50bd7adc55e6515adc2e32e9c92967c635b9bdc9bb41ffc1d9f9466f63716443"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}]}, 0x80}, 0x1, 0x0, 0x0, 0x40000}, 0x2004844) 16:10:25 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x2010, r0, 0x0) 16:10:25 executing program 5: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0, 0xf0ff7f}}, 0x0) 16:10:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000201000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000fffe01000000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000004600)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000044c0)=[@cred={{0x1c}}], 0x20}}], 0x1, 0x0) 16:10:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000040201000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:26 executing program 3: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYBLOB="0000270001"], 0xb4}}, 0x0) 16:10:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:26 executing program 5: syz_mount_image$ext4(&(0x7f0000013500)='ext4\x00', &(0x7f0000013540)='./file0\x00', 0x0, 0x0, &(0x7f0000013cc0), 0x0, &(0x7f0000013dc0)={[], [{@fowner_gt={'fowner>', 0xee01}}]}) 16:10:26 executing program 0: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x1d4fc000, 0x0, 0x92832, 0xffffffffffffffff, 0x8000000) 16:10:26 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f0000000000)=0xfffffffe, 0x4) 16:10:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:26 executing program 5: syz_mount_image$tmpfs(&(0x7f0000006a00), &(0x7f0000006a40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000006ac0)) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', 'nr_blocks'}, 0x0, 0x0, 0x3) 16:10:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000301000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:26 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x22582) ioctl$EVIOCGMTSLOTS(r0, 0x5452, &(0x7f0000000080)=""/124) 16:10:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000008240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10243, 0x0) 16:10:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:26 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x6, 0x0, &(0x7f0000000080)) 16:10:26 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=ANY=[@ANYBLOB="84"], 0x1084}, 0x1, 0x0, 0x0, 0x1}, 0x0) 16:10:26 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x802) ioctl$MON_IOCX_GETX(r0, 0xc0109207, &(0x7f0000000140)={0x0, 0x0}) 16:10:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000020301000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:26 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc2}, &(0x7f0000000180)={0x0, "8d9c22a12aed7a14376ef2182335c1992a0798fbdc8f4b09aa0d908e41ff27e63cf627427108e7a9e1bb4908f8cd54368cc817a4b983eb9a4ab93a3c3a4bd9a0"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r0) 16:10:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000000040000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:26 executing program 1: syz_open_dev$usbmon(&(0x7f0000000040), 0xffffffffffffffff, 0x2ec581) 16:10:26 executing program 3: add_key(&(0x7f0000000080)='logon\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000240)="ae", 0x1, 0xfffffffffffffffc) 16:10:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmsg(r0, &(0x7f0000001740)={&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, &(0x7f0000001680)=[{&(0x7f0000000140)=""/48, 0x30}, {&(0x7f0000000180)=""/84, 0x54}, {&(0x7f0000000200)=""/213, 0xd5}, {&(0x7f0000000300)=""/47, 0x2f}, {&(0x7f0000000340)=""/63, 0x3f}, {&(0x7f0000000380)=""/89, 0x59}, {&(0x7f0000000400)=""/175, 0xaf}, {&(0x7f00000004c0)=""/4, 0xfffffffffffffd1e}, {&(0x7f00000005c0)=""/180, 0xb4}, {&(0x7f00000017c0)=""/4098, 0x1002}], 0xa, &(0x7f0000000500)=""/105, 0x69}, 0x0) [ 1351.849796][T30553] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=30553 comm=syz-executor.5 16:10:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000401000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = fork() sendmmsg$unix(r0, &(0x7f0000004600)=[{{&(0x7f0000000040)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000044c0)=[@cred={{0x1c, 0x1, 0x2, {r1}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x38}}], 0x1, 0x0) 16:10:26 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) mmap$usbmon(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x5421, 0x0) 16:10:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:26 executing program 5: setresuid(0xee00, 0x0, 0x0) r0 = getuid() setresuid(0xee01, r0, 0x0) r1 = getuid() setuid(r1) setresuid(0x0, r0, 0x0) 16:10:26 executing program 3: syz_open_dev$evdev(&(0x7f0000000080), 0x5, 0x44040) 16:10:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000501000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:26 executing program 0: unshare(0x20600) unshare(0x48020200) unshare(0x20000) 16:10:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) accept4$unix(r0, 0x0, 0x0, 0x0) 16:10:26 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_udp_int(r0, 0x11, 0x0, 0x0, 0x0) 16:10:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000000340000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000601000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @empty}, 0x200000d0) 16:10:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000040601000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, 0x0, 0x0) 16:10:26 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) recvmmsg$unix(r0, &(0x7f0000002940)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:10:26 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f0000000000)=0xfffffffe, 0x4) 16:10:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x8905, &(0x7f0000000000)) 16:10:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000701000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:26 executing program 3: add_key(&(0x7f0000000180)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) 16:10:26 executing program 1: socket(0xa, 0x0, 0x3ff) 16:10:26 executing program 0: syz_mount_image$tmpfs(&(0x7f0000006a00), &(0x7f0000006a40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000006ac0)={[{@nr_blocks={'nr_blocks', 0x3d, [0x30, 0x0]}}]}) 16:10:26 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f00000007c0)=[{{0x0, 0x0, &(0x7f0000000740)=[{0x0}, {0xffffffffffffffff}], 0x2}}], 0x1, 0x0, 0x0) 16:10:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000ffffee0701000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000001200000000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:26 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x14, 0x0, &(0x7f0000000080)) 16:10:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0xe000, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @empty}}}}) 16:10:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000003400000000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:26 executing program 1: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x35, 0x66, 0x30, 0x64, 0x37, 0x31, 0x37, 0x62]}, &(0x7f0000000080)={0x0, "aa5564a6a5a7047c681bd84d19ea8b35d613d4dd72942e17ad81581d1051b3537214be86b02683f9cc0a6cf73714b9682030b6defbe0f1a2bb6b534b6f08e7f3", 0x3c}, 0x48, 0xfffffffffffffffb) 16:10:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x48, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x2c, 0x8, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}]}, 0x48}}, 0x0) 16:10:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000801000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:26 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x8, 0x8, 0x0, 0x1, [{0x4, 0x0, 0x0, 0x0}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}]}, 0x24}}, 0x0) 16:10:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:26 executing program 5: openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.pending_reads\x00', 0x1958c0, 0x0) 16:10:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000007a80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003540)=[@rights={{0x10}}], 0x10}}], 0x1, 0x0) 16:10:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000901000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:26 executing program 1: openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x440000, 0x0) 16:10:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0xc4, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}, @WGDEVICE_A_FWMARK={0x8}, @WGDEVICE_A_PEERS={0x7c, 0x8, 0x0, 0x1, [{0x78, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x2c, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @remote}}, {0x5}}]}]}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "50bd7adc55e6515adc2e32e9c92967c635b9bdc9bb41ffc1d9f9466f63716443"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}]}, 0xc4}}, 0x0) 16:10:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000a01000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_ASSOCIATE(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x40, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_HT_CAPABILITY_MASK={0x1e}]}, 0x40}}, 0x0) 16:10:26 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x121, 0x0, 0x0, {{}, {0x0, 0x4107}, {0x14, 0x18, {0x0, @bearer=@l2={'ib', 0x3a, 'ip6tnl0\x00'}}}}}, 0x30}}, 0x0) 16:10:26 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=ANY=[], 0x1084}, 0x1, 0x0, 0x0, 0x1}, 0x804) 16:10:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000b01000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:27 executing program 3: setresuid(0xee00, 0x0, 0x0) r0 = getuid() r1 = getuid() setresuid(0xee01, r0, 0x0) setresuid(r1, 0xffffffffffffffff, 0x0) 16:10:27 executing program 5: rt_sigtimedwait(&(0x7f0000000200), 0x0, 0x0, 0x8) getrusage(0x0, &(0x7f0000001640)) 16:10:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000004600)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000044c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0) 16:10:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000c01000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:27 executing program 0: syz_mount_image$tmpfs(&(0x7f0000006a00), &(0x7f0000006a40)='./file0\x00', 0x0, 0x0, 0x0, 0x3, &(0x7f0000006ac0)) 16:10:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:27 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x80089203, 0x0) 16:10:27 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000004840), 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x8000000) 16:10:27 executing program 1: syz_open_dev$usbmon(&(0x7f0000000240), 0x3, 0x2040) 16:10:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000d01000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x4, 0x0, 0x0) 16:10:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={0x0, 0xb4}}, 0x0) 16:10:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:27 executing program 5: r0 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) timerfd_settime(r0, 0x3, &(0x7f0000000000)={{}, {r1, r2+60000000}}, 0x0) 16:10:27 executing program 1: setresuid(0xee00, 0x0, 0x0) r0 = getuid() setresuid(0xee01, r0, 0x0) setresuid(0x0, 0x0, r0) 16:10:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000e01000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:27 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000004840), 0x0, 0x0) sendmmsg$unix(r0, 0x0, 0x0, 0x0) 16:10:27 executing program 0: syz_mount_image$tmpfs(&(0x7f0000006a00), &(0x7f0000006a40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000006ac0)={[{@nr_blocks={'nr_blocks', 0x3d, [0x30, 0x65]}}]}) 16:10:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:28 executing program 1: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2002, 0x0, 0x92832, 0xffffffffffffffff, 0x8000000) 16:10:28 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x9, 0x282) mmap$usbmon(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) 16:10:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r0, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[], 0xd8}}, 0x0) 16:10:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000f01000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:28 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x121, 0x0, 0x0, {{}, {}, {0x3, 0x18, {0x0, @bearer=@l2={'ib', 0x3a, 'ip6tnl0\x00'}}}}}, 0x30}}, 0x0) 16:10:28 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000540), &(0x7f0000000000)=0x44) 16:10:28 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x3938700}}, 0x0) 16:10:28 executing program 3: select(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000140)={0x3}, &(0x7f0000000180)) 16:10:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000001001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:28 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f00000001c0)={0x0, 0x0}) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f00000000c0)={0x0, 0x0}) 16:10:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x9c, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_PEERS={0x78, 0x8, 0x0, 0x1, [{0x74, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x2c, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @remote}}, {0x5}}]}]}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @private2}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}]}, 0x9c}}, 0x0) 16:10:28 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x78, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_PEERS={0x28, 0x8, 0x0, 0x1, [{0x24, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @loopback}}]}]}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}, @WGDEVICE_A_FWMARK={0x8}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}]}, 0x78}}, 0x0) 16:10:28 executing program 1: memfd_create(&(0x7f0000000040)='^\x00', 0x4) 16:10:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000001101000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:28 executing program 1: add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) 16:10:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000001201000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:28 executing program 5: io_setup(0x7a1, &(0x7f0000000100)=0x0) io_destroy(r0) io_submit(r0, 0x0, 0x0) 16:10:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:28 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x0) 16:10:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:29 executing program 3: syz_open_dev$evdev(&(0x7f0000001780), 0x2, 0x0) 16:10:29 executing program 1: r0 = timerfd_create(0x8, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_gettime(0x2, &(0x7f0000000080)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f00000000c0)={{0x0, r1+10000000}, {0x0, r2+10000000}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}}, 0x0) 16:10:29 executing program 0: syz_open_dev$evdev(&(0x7f0000000040), 0xffffffffffffffe0, 0x200000) 16:10:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000001801000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000e01000000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8914, &(0x7f0000000080)={'gre0\x00', 0x0}) 16:10:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000001901000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f000000c7c0)) 16:10:29 executing program 1: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) 16:10:29 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=ANY=[@ANYBLOB="841000001300010029bd7000ffffff7f1804a2fc34915f37fc523e0300010000ff000000ffff00000080", @ANYRES32=0x0], 0x1084}, 0x1, 0x0, 0x0, 0x1}, 0x804) 16:10:29 executing program 3: unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x200) 16:10:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000001f01000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:29 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x80044584, 0x0) 16:10:29 executing program 0: syz_mount_image$tmpfs(&(0x7f0000006a00), &(0x7f0000006a40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000006ac0)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, &(0x7f00000018c0)) 16:10:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000001001000000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x121, 0x0, 0x0, {{}, {}, {0x9, 0x18, {0x0, @bearer=@l2={'ib', 0x3a, 'ip6tnl0\x00'}}}}}, 0x30}}, 0x0) 16:10:29 executing program 5: syz_mount_image$tmpfs(&(0x7f0000006a00), &(0x7f0000006a40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000006ac0)) setxattr$incfs_id(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, 0x0, 0x0) 16:10:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000002001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f00000000c0)=@ethernet={0x0, @broadcast}, &(0x7f0000000080)=0xffffffffffffff93) 16:10:29 executing program 0: syz_open_dev$evdev(&(0x7f0000000000), 0x5, 0x440) 16:10:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:29 executing program 3: setresuid(0xee00, 0x0, 0x0) r0 = getuid() setresuid(0xee01, r0, 0x0) setresuid(0x0, r0, 0x0) 16:10:29 executing program 5: io_setup(0x3e8, &(0x7f0000000040)=0x0) io_submit(r0, 0x0, 0x0) io_setup(0xffff, &(0x7f0000000440)) 16:10:29 executing program 0: select(0x40, &(0x7f0000000100), &(0x7f0000000140)={0x4}, &(0x7f0000000180)={0x2}, 0x0) 16:10:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000102001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:29 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4, 0x4000011, r0, 0x0) 16:10:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000002201000000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:29 executing program 3: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_CQM(r1, &(0x7f0000000240)={&(0x7f00000001c0), 0xc, &(0x7f0000000200)={&(0x7f0000000300)={0x20, r0, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_CQM={0x8, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_THOLD={0x4}]}, @NL80211_ATTR_CQM={0x4}]}, 0x20}}, 0x0) 16:10:29 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x40284504, 0x0) 16:10:29 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 16:10:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000002201000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:29 executing program 0: setresuid(0xee00, 0x0, 0x0) r0 = getuid() r1 = getuid() setresuid(r0, r1, 0x0) setresuid(0x0, 0xffffffffffffffff, 0x0) 16:10:29 executing program 3: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) 16:10:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000000005f2401000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:29 executing program 5: setresuid(0xee00, 0x0, 0x0) r0 = getuid() setresuid(0x0, r0, 0x0) setresuid(r0, 0x0, 0x0) 16:10:29 executing program 3: socket(0x10, 0x0, 0x5926) 16:10:29 executing program 0: process_madvise(0xffffffffffffffff, &(0x7f00000016c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0) 16:10:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:29 executing program 1: r0 = timerfd_create(0x8, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_gettime(0x2, &(0x7f0000000080)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f00000000c0)={{r1, r2+10000000}, {0x0, r3+10000000}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}}, 0x0) 16:10:29 executing program 3: syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r0 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) mmap$usbmon(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) 16:10:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:29 executing program 0: request_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='(]\x00', 0xfffffffffffffffc) 16:10:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000002501000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:29 executing program 5: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 16:10:29 executing program 1: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040)={[0x8]}, 0x8) 16:10:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x13, &(0x7f0000000100)=0x7, 0x4) 16:10:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000002e01000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x25, &(0x7f0000000000)=0xfffffffe, 0x4) 16:10:29 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000002f80)={0x2, &(0x7f00000015c0)=[{}, {0x100}]}) 16:10:29 executing program 5: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r1, r2, 0x0, 0x0) 16:10:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000003f01000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @empty}, 0x2) 16:10:29 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r0, &(0x7f0000005500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:10:29 executing program 5: wait4(0xffffffffffffffff, 0x0, 0x4, 0x0) 16:10:29 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x12042, &(0x7f0000000680)) 16:10:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000004001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:29 executing program 5: setresuid(0xee00, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 16:10:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000000)=0xfffffffc, 0x4) 16:10:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:29 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xd, &(0x7f0000000000)=0xfffffffe, 0x4) 16:10:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000004801000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:29 executing program 5: io_setup(0x57, &(0x7f0000000000)=0x0) io_destroy(r0) io_cancel(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0) 16:10:30 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000004840), 0x0, 0x0) write$P9_ROPEN(r0, 0x0, 0x0) 16:10:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040), 0x2) 16:10:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000004c01000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:30 executing program 0: syz_mount_image$msdos(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f0000000140)="327da208d6d19a3ddf8ccf7b", 0xc, 0x5}, {0x0, 0x0, 0x5ab}], 0x0, &(0x7f0000002900)) 16:10:30 executing program 1: openat$pidfd(0xffffffffffffff9c, &(0x7f000000f6c0), 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_sock_diag(0x10, 0x3, 0x4) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000013500)='ext4\x00', &(0x7f0000013540)='./file0\x00', 0x0, 0x5, &(0x7f0000013cc0)=[{0x0}, {&(0x7f0000013740)}, {0x0, 0x0, 0x3}, {0x0}, {0x0}], 0x881804, &(0x7f0000013dc0)={[{@nomblk_io_submit}, {@journal_ioprio}], [{@uid_lt={'uid<', 0xee00}}]}) 16:10:30 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0xf0ff7f, 0x0, 0x0) 16:10:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000006001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:30 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000400)=@file={0x1, './file0\x00'}, 0x6e) 16:10:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000007a01000000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:30 executing program 0: setresuid(0xee00, 0x0, 0x0) r0 = getuid() setresuid(0xee01, r0, 0x0) setresuid(0xffffffffffffffff, 0x0, r0) 16:10:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000006801000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:30 executing program 3: add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc2}, &(0x7f0000000180)={0x0, "8d9c22a12aed7a14376ef2182335c1992a0798fbdc8f4b09aa0d908e41ff27e63cf627427108e7a9e1bb4908f8cd54368cc817a4b983eb9a4ab93a3c3a4bd9a0"}, 0x48, 0xfffffffffffffffb) 16:10:30 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, &(0x7f0000000000)="cd", 0x1, 0x0, &(0x7f0000000080)=@abs={0x1}, 0x6e) 16:10:30 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9b6fbf065b2cecfa"}) 16:10:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000006c01000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:30 executing program 3: setresuid(0xee00, 0x0, 0x0) r0 = getuid() setresuid(r0, 0xee00, 0x0) setresuid(0xffffffffffffffff, r0, 0x0) 16:10:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x14, r1, 0x1, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 16:10:30 executing program 1: syz_mount_image$ext4(0x0, &(0x7f000000db00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:10:30 executing program 5: syz_mount_image$tmpfs(&(0x7f0000006a00), &(0x7f0000006a40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000006ac0)) unlink(&(0x7f0000000000)='./file0/file0\x00') 16:10:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000003000000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000007401000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:31 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f000000ee00), 0x0, 0x0) fork() 16:10:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000007a01000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:31 executing program 1: socketpair(0x10, 0x0, 0x7, &(0x7f00000002c0)) 16:10:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000007a80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 16:10:31 executing program 5: clone3(&(0x7f0000003380)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 16:10:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x19, 0x0, &(0x7f0000000080)) 16:10:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, &(0x7f0000003cc0)=@abs, &(0x7f00000000c0)=0x6e) 16:10:31 executing program 1: syz_mount_image$tmpfs(&(0x7f0000006a00), &(0x7f0000006a40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000006ac0)={[{@nr_blocks={'nr_blocks', 0x3d, [0x65]}}]}) 16:10:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000ffffff8501000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:31 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=ANY=[@ANYBLOB="8410"], 0x1084}, 0x1, 0x0, 0x0, 0x1}, 0x804) 16:10:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:31 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x40084504, &(0x7f0000000080)=""/124) 16:10:31 executing program 3: clock_gettime(0x0, &(0x7f000000b900)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000000c7c0)) 16:10:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000ffffff8c01000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:31 executing program 1: io_setup(0x1004, &(0x7f0000000040)=0x0) io_destroy(r0) 16:10:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xd, &(0x7f0000000000), 0x8) 16:10:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f00000000000000000f000000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) [ 1356.796262][T31062] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=31062 comm=syz-executor.0 16:10:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000000000a9001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000011000000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:31 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x4c, 0x12, 0x1, 0x0, 0x0, {0x2}}, 0x4c}}, 0x0) 16:10:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r0, &(0x7f00000000c0)={0x2, 0xee47, @empty}, 0x10) 16:10:31 executing program 5: unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) 16:10:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000003b801000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:31 executing program 1: pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000200)={0x7}, &(0x7f0000000240)={0x0, 0x3938700}, 0x0) 16:10:31 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/tty/ldiscs\x00', 0x0, 0x0) 16:10:31 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f00000006c0)={@private, @broadcast}, 0x8) 16:10:31 executing program 3: syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)={[], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 16:10:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000003ba01000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x5, 0x0, &(0x7f0000000080)) 16:10:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x25, 0x0, &(0x7f0000000080)) 16:10:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000003bb01000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:31 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f0000003f80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}], 0x20}}], 0x1, 0x0) 16:10:31 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x80104592, &(0x7f0000000080)=""/124) 16:10:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[], 0x24}}, 0x0) 16:10:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x14, r1, 0x1, 0x0, 0x0, {0x0}}, 0x14}}, 0x0) 16:10:31 executing program 0: io_setup(0x1004, &(0x7f0000000040)=0x0) io_setup(0x4, &(0x7f0000000280)=0x0) io_destroy(r1) io_destroy(r0) io_setup(0x8, &(0x7f0000000140)) 16:10:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000003bc01000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0xfffffffffffffe11, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16, @ANYBLOB="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"], 0x154}, 0x1, 0x0, 0x0, 0x40}, 0x40) 16:10:31 executing program 1: unshare(0xc000200) 16:10:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:31 executing program 5: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0xeabac9c6e4157d38, 0x0) 16:10:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000003bd01000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:31 executing program 3: setresuid(0xee00, 0x0, 0x0) r0 = getuid() setuid(r0) r1 = getuid() r2 = getuid() setresuid(r1, r2, 0x0) 16:10:31 executing program 1: r0 = socket(0xa, 0x3, 0x8) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x40000001) 16:10:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000064000000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000003be01000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="80000000", @ANYRES16=r1, @ANYBLOB="0100000000000000000001000000640008806000008014000400020000000000000000000000000000002400020050bd7adc55e6515cdc2e32e9c92967c635b9bdc9bb41ffc1d9f9466f6371644324000100975c9d81c983c8209ee781254b899f8ed925ae9f0923c23c62f53c57cdbf691c080001000c"], 0x80}}, 0x0) 16:10:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x24, r1, 0x11, 0x0, 0x0, {{}, {}, {0x8, 0x2, 0x46}}}, 0x24}}, 0x0) 16:10:31 executing program 1: unshare(0x20600) listen(0xffffffffffffffff, 0x0) 16:10:31 executing program 0: syz_mount_image$tmpfs(&(0x7f0000006a00), &(0x7f0000006a40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000006ac0)={[{@nr_blocks={'nr_blocks', 0x3d, [0x70]}}]}) 16:10:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000003bf01000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:31 executing program 5: syslog(0x3, &(0x7f0000000000)=""/238, 0xee) 16:10:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r1, 0x1}, 0x1c}}, 0x0) 16:10:31 executing program 0: r0 = socket(0x2, 0x3, 0x5) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000180)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={0x0}}, 0x0) 16:10:31 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f00000012c0)=[{&(0x7f0000000080)="9f", 0x1}, {&(0x7f0000000180)="80d9fa008dc174860d003367e9f53e3969695f67bc63fca923993f9383ac09bab942eae2bea7e7cee90cbb8870e14008d77b882da3088cdc00a3e3467a2e1cf138790d70c8db2759949d12790b9c7bbd99b97146d5770228679f439432e251546eab98e46c86f4091d0bff36c375c703289a4896323d767a653a4d2c08f3d323", 0x80, 0x7f}], 0x0, 0x0) 16:10:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000003c001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f00000000000000fffe000000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:31 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x80084504, 0x0) 16:10:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000003c101000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:32 executing program 1: syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100), &(0x7f0000000240)=ANY=[], 0x10, 0x0) 16:10:32 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000004840), 0x0, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x0, 0x0, 0x0) 16:10:32 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480), 0x42, 0x0) 16:10:32 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREAD(r0, &(0x7f0000000040)={0xb}, 0xb) 16:10:32 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x70, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_PEERS={0x4c, 0x8, 0x0, 0x1, [{0x48, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @private2}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}]}, 0x70}}, 0x0) 16:10:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:32 executing program 3: r0 = timerfd_create(0x9, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x3938700}, {0x77359400}}, 0x0) 16:10:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000ffffffda01000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x123, 0x0) 16:10:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0xb, 0x0, &(0x7f0000000080)) 16:10:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000ffffffe201000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x8, 0x8, 0x0, 0x1, [{0x4}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}]}, 0x24}}, 0x0) 16:10:32 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f000000d1c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 16:10:32 executing program 0: io_setup(0x4, &(0x7f0000000280)=0x0) io_setup(0x8, &(0x7f0000000080)) io_destroy(r0) io_setup(0x8, &(0x7f0000000140)) 16:10:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000fffffff001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:32 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x98, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}, @WGDEVICE_A_FWMARK={0x8}, @WGDEVICE_A_PEERS={0x50, 0x8, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "50bd7adc55e6515adc2e32e9c92967c635b9bdc9bb41ffc1d9f9466f63716443"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}]}, 0x98}}, 0x0) 16:10:32 executing program 5: socket(0x10, 0x3, 0x2) 16:10:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000006000000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000003f201000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:32 executing program 5: getresgid(0x0, 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) mmap$usbmon(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) 16:10:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:32 executing program 5: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f00000012c0)=[{&(0x7f0000000080)="9f46", 0x2, 0x1}, {&(0x7f00000002c0)="31541cc2a6d9a986e188cbef410a7d757c8fc46e1a66a74ecb136d614ab2ae20ec395929c02dfdd4cf63cda1dc5e4269417e0868a48a7b9757d520eddabf57eb8aaaa519aa83c5730fa762c0fce1af6ae416f7641032f1491aa7a6cd7f7f4f696422289f1245f41b9ca82110b2ea3a489f13e8f6882ec34da675309604f348cb257afa0a6903da11210b1ec99758ee81234a2fb90711a544727eecdd303a4711146ce55ada627ad0512f5a2da3c897b19c6fbeb456a4b56caef5b45cfedc523483892e3f", 0xc4}], 0x0, 0x0) 16:10:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000003f301000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 1359.530333][T31257] cgroup: Unknown subsys name 'perf_event' [ 1359.536360][T31257] cgroup: Unknown subsys name 'net_cls' 16:10:35 executing program 3: recvmmsg$unix(0xffffffffffffffff, &(0x7f0000005440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fork() 16:10:35 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000001780), 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, 0x0) 16:10:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:35 executing program 5: socket(0x10, 0x2, 0x5) 16:10:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000003f401000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0xe000, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @empty}}}}) 16:10:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000003f501000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:35 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x40010, r0, 0x8000000) 16:10:35 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) 16:10:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:35 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000000140)={0x0, 0x0}) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x0) 16:10:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x22, 0x0, &(0x7f0000000080)) 16:10:35 executing program 1: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffb) 16:10:35 executing program 0: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x35, 0x66, 0x30, 0x64, 0x37, 0x0, 0x37, 0x62]}, &(0x7f0000000080)={0x0, "aa5564a6a5a7047c681bd84d19ea8b35d613d4dd72942e17ad81581d1051b3537214be86b02683f9cc0a6cf73714b9682030b6defbe0f1a2bb6b534b6f08e7f3", 0x3c}, 0x48, 0xfffffffffffffffb) 16:10:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000003f601000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:35 executing program 5: mknodat(0xffffffffffffffff, &(0x7f0000000080)='\x00', 0x0, 0x0) 16:10:35 executing program 1: io_setup(0x7a1, &(0x7f0000000100)) io_setup(0x4, &(0x7f0000000280)) io_setup(0x8, &(0x7f0000000080)) 16:10:35 executing program 0: add_key$keyring(&(0x7f0000000280), 0x0, 0x0, 0x0, 0xfffffffffffffffc) 16:10:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000fffffff601000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:35 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x80, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 16:10:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:36 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) getsockopt$sock_cred(r0, 0x4, 0x11, 0x0, 0x0) 16:10:36 executing program 0: clock_gettime(0x0, &(0x7f0000000180)={0x0}) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={r0}) 16:10:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000003f701000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:36 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind(r0, &(0x7f0000000100)=@in={0x2, 0x4e24, @dev}, 0x80) 16:10:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x8, 0x0, &(0x7f0000000080)) 16:10:36 executing program 1: unshare(0x40000000) waitid(0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)) 16:10:36 executing program 3: perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:10:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000fffffdf901000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x2, 0x800, {{0x15, 0x4, 0x3, 0x22, 0x54, 0x67, 0x0, 0x80, 0x2f, 0x0, @rand_addr=0x64010101, @empty, {[@generic={0x7, 0x9, "9b2e4593de3185"}, @ssrr={0x89, 0xf, 0x5f, [@local, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @lsrr={0x83, 0x7, 0xae, [@multicast1]}, @end, @timestamp={0x44, 0x14, 0x9d, 0x0, 0x1, [0x5, 0x0, 0x7, 0x42ef]}, @end, @ssrr={0x89, 0xb, 0x9b, [@rand_addr=0x64010101, @broadcast]}]}}}}}) 16:10:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000012000000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000fffffffb01000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:36 executing program 3: unshare(0x20600) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) 16:10:36 executing program 0: r0 = fork() pidfd_open(r0, 0x0) 16:10:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @empty}}}}) 16:10:36 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x80089203, &(0x7f0000000140)={0x0, 0x0}) 16:10:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000fffffdfd01000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:36 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@mode}]}) 16:10:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:37 executing program 1: pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x2}, 0x0, &(0x7f0000000240)={0x0, 0x3938700}, 0x0) 16:10:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$AUDIT_GET(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0, 0xfffffdf2}}, 0x40c0) 16:10:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) 16:10:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000fffffffe01000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000005c0)={0xb8, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x0, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL]}, @TIPC_NLA_BEARER_DOMAIN, @TIPC_NLA_BEARER_DOMAIN, @TIPC_NLA_BEARER_UDP_OPTS={0x0, 0x4, {{0x0, 0x1, @in6={0xa, 0x0, 0x0, @private1}}, {0x0, 0x2, @in6={0xa, 0x0, 0x0, @empty}}}}, @TIPC_NLA_BEARER_NAME={0x0, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x0, 0x4, {{0x0, 0x1, @in={0x2, 0x0, @private}}, {0x0, 0x2, @in={0x2, 0x0, @loopback}}}}]}, @TIPC_NLA_MEDIA={0x94, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0xfffffd99}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8}]}]}, 0xb8}}, 0x0) 16:10:37 executing program 1: clock_gettime(0xfffffffffffffffc, 0x0) 16:10:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000000000fff01000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:37 executing program 3: socketpair(0x1, 0x0, 0x986f, &(0x7f0000001240)) 16:10:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="21ffffffffffffffff0001"], 0x30}}, 0x0) 16:10:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000100)=@abs, 0x6e) 16:10:37 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$evdev(&(0x7f0000005200), 0x0, 0x0) fork() 16:10:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000fffffbff01000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f0000000000000000fe000000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:37 executing program 3: r0 = timerfd_create(0x9, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x77359400}}, 0x0) 16:10:37 executing program 5: syz_mount_image$tmpfs(&(0x7f0000006a00), &(0x7f0000006a40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000006ac0)={[{@nr_blocks={'nr_blocks', 0x3d, [0x54]}}]}) 16:10:37 executing program 0: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000000)={{}, {0x0, 0x3938700}}, 0x0) 16:10:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000003ffff01000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:37 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x6, &(0x7f00000005c0)=[{&(0x7f00000000c0)='\x00F', 0x2, 0xfff}, {&(0x7f00000001c0)='L', 0x1, 0xffffffff80000000}, {&(0x7f0000000200)='Q', 0x1}, {&(0x7f0000000240)="9c", 0x1}, {&(0x7f0000000280)='^', 0x1}, {&(0x7f0000000380)="c7", 0x1, 0x10000}], 0x0, 0x0) 16:10:37 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005880)='./cgroup/syz0\x00', 0x200002, 0x0) 16:10:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:37 executing program 5: syz_mount_image$tmpfs(&(0x7f0000006a00), &(0x7f0000006a40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x2002a, &(0x7f0000000080)) 16:10:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000001fffff01000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:37 executing program 3: io_setup(0x1004, &(0x7f0000000040)=0x0) io_setup(0x4, &(0x7f0000000280)=0x0) io_setup(0x8, &(0x7f0000000080)) io_destroy(r1) io_destroy(r0) 16:10:37 executing program 0: syz_mount_image$tmpfs(&(0x7f0000006a00), &(0x7f0000006a40)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@nr_blocks={'nr_blocks', 0x3d, [0x33, 0x0]}}]}) 16:10:37 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) mmap$usbmon(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) 16:10:37 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=ANY=[@ANYBLOB="8410"], 0x1084}}, 0x0) 16:10:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000007fffffff01000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:37 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x4020940d, &(0x7f0000000080)=""/124) 16:10:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:37 executing program 1: syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0xaaaaaaaaaaaab43, &(0x7f0000000880)=[{&(0x7f00000001c0)="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", 0xfe, 0x4b1}, {&(0x7f00000002c0)="4d72da62d2916f065072c7ba04d79a6c6cfc4a243f8585588e5ae35124422c9c7de8be67dac30cff06efb557336fbb77f8742fd45fbfd46b8652bd88cc62c70b1fbce28cda705e11aa0e33511e87b4938d2168ee3ed2b30c", 0x58, 0x4}, {&(0x7f0000000340)="509c2f4d5150639c6d54ff2435f3bf30428eca8bf6164b4430d173500a8dd07416e3341f42b10e6d2415562021a446f1ca601ce73bc2a20104e90dd66effb81db8fa2999828d25e180396bc131b94837de5ebc3c76621691b634533b89bc235963d065cd158bbcc212846fc8daa73cdea06c46ff91524b59da78ee4a8bb8d5ea0a75", 0x82, 0xdbf7}, {&(0x7f0000000400)="84d7fc77d7d11b2c97ffd8c156b8f074d62ac1e392b45c8f12c8742175fc0b0cd5663680594192e699a838345de10210e466473dafa1bc7cfc82cd22e92fed3255b085f2677a2af7ea74b2ba23f57669735b8ddd48f4b305cfb95cb1ed366b0c4fae8f556487ac402339743083a82307f03c34c99214d0a0fe0c0886366dd16f30b81624873a4c73cf77607ce702936ff92e0c4fc6b3c254b16c312b68942b467a366798c441e18ce3b42dc0f29a973b47f761043a4e0c2e1f9b3a7ee491acbd819129f0dce4b25c56e5facd3b1aa729b36f530ee96eea523143ec6b076298dba070a0e0a58b51b62ef1718ab24b363d12343e4a3fc6d33dba", 0xf9, 0x754}, {&(0x7f0000000500)="b11a3d9ff3160166cf0ae757d35e965ac4c5b3cbea8eed643ad965efd870c5757ed2df126b9969a988dddb8eb9928a811779c02274b7c6aa8e0462c53c4783dd4b8bae0494e98205f918f45d3694c59e38a847bbd674b1f60cebea8f886c09bba64c7641967c4837b2cd2ed7a2105b07dcc73ee97fd19340c4a24b6227de8aa9a1c5dc380f", 0x85, 0x2}, {&(0x7f00000005c0)="f6b15c54930d46a12636db76666b9d59c7deb4a504c3f687221385d7b77e261df8a84141864ea6cdbcfc42c6d7ce25ecb5c3fc8bef26a33c4b01d3a87dd9012503c403e2c620293503c0f3534fcd5f4f9be9e4b1e1d87564009d7573bede576c26ac15878415c5ce03c49c1687e0d26cda8403fe9e67260296e0bb9cd43b12007342dcb680dab4bf2d18f782a03acc19111c9574b881012a2d011fa3988e15efacfbca2846e3a0f49d285c7b2df8a5b535f5712aed5d795175c011a0237c4e", 0xbf, 0x2}, {&(0x7f0000000680)="c881470c1c64b98e4feee20e913c760ac37453d54c734dc4db5f66b22ded4d5ba906545ff169adaed93aac0846dc601d5a2482270ac79da6a45b478d26c8584282593592f4a64ea5cd4b14a6374fbc0d373d8c9be995995ce207cc226c92edf977fb57db6f37c4eee9326ca63897a50efbe6f1f570724980f12cddf2f8c61d03f6443b570a59deeaaa7056bcdb286a006c9c047a206f3b5160cf48c9f53377949bc9166dcea1db530a9ee75d14ae4bc5f652b1b7f25d0821770eb4d1e50839ec745522311b3a8166e7d081046bcc92648d11161313c4bebae2f6cd8070a45e276b535b", 0xe3, 0x8}, {&(0x7f0000000780)="901d9caaced13457238e9ae62d792ee2c76934bb69b430b70b0dab3edcb5efd8ac7b97e3a89182bc974973eb6ea1e6234d7868550229d5ae024139874cb2b4b4d02b28acc02d6d159fbd087a46883d92cd36895d562040cedc48d298cc006be0a3ca6b715406461742b897edbe430204dfda4470f704c90db23e91f58184ec6a74d6de12de643a0d78a0132105f2c58b42c8ad145fe4f77ab88536351494e2190b689b998cf93c066abfbd8039f7a9a022b3116f35b0a292d3e0f187dbd8ab27adfc6ffaf76d1cbedc9b44861f02700247289e9bfcf293b34ef37ec92c2e0e2cd2b05cd52fdd29bf57f5d99814838beb", 0xf0, 0x4}], 0x2830004, &(0x7f0000000940)=ANY=[@ANYBLOB="6e6f646f74732c866f74732c6e6f646f74732c646f74732c6e6f646f749d000000646f74732c6e6f646f74732c7375626a5f757365723d2f6465762f6e65742f74756e002c7569643e", @ANYRESDEC=0xee01, @ANYBLOB=',obj_type=/dev/hwrng\x00,\x00']) 16:10:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000ffffffff01000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 1363.067001][T31897] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=31897 comm=syz-executor.5 16:10:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x38, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x1c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0xa, {0x2, 0x0, @private}}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}]}, 0x38}}, 0x0) 16:10:37 executing program 0: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x80000000, 0x0) 16:10:37 executing program 3: syz_io_uring_setup(0x0, 0xfffffffffffffffc, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000000), &(0x7f00000000c0)) 16:10:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000000340000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655fffffffffffffffff01000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:37 executing program 0: setresuid(0xee00, 0x0, 0x0) r0 = getuid() setresuid(0x0, r0, 0x0) unshare(0x20600) 16:10:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000000)=""/58, 0x3b}, {&(0x7f0000000100)=""/193, 0xc1}, {&(0x7f0000000040)=""/96, 0xfffffffffffffe02}, {&(0x7f0000000200)=""/191, 0xbf}, {&(0x7f00000002c0)=""/100, 0x64}, {&(0x7f0000000340)=""/59, 0x3b}], 0x6, &(0x7f0000001440)=""/4108, 0x1014}, 0x0) 16:10:37 executing program 3: rmdir(&(0x7f0000001980)='.\x00') 16:10:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000200000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000040)=0x1, 0x4) 16:10:38 executing program 5: unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 16:10:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000880)=ANY=[@ANYBLOB="6c150000", @ANYRES16=r1, @ANYRES64], 0x156c}}, 0x0) 16:10:38 executing program 3: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x111900, 0x0) 16:10:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000400000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f000000d300)) 16:10:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040), 0xfda1) 16:10:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000004000000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:38 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x9, 0x0) mmap$usbmon(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) 16:10:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:38 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendmmsg(r0, 0x0, 0x0, 0x0) 16:10:38 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x101402) mmap$usbmon(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) 16:10:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:38 executing program 5: syz_open_dev$usbmon(&(0x7f0000000100), 0x3, 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x46081) 16:10:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000008000000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:38 executing program 0: openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x0, 0x0) openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x0, 0x0) 16:10:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x0, 0x0, 0x0) 16:10:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002b400000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:38 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000004840), 0x0, 0x0) sendmsg$NL80211_CMD_PROBE_CLIENT(r0, 0x0, 0x0) 16:10:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040), 0x1) 16:10:38 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RREADLINK(r0, &(0x7f0000000040)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) 16:10:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:38 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) accept$inet(r0, 0x0, 0x0) 16:10:38 executing program 1: setresuid(0x0, 0xee00, 0x0) setfsuid(0x0) 16:10:38 executing program 5: syz_mount_image$tmpfs(&(0x7f0000005100), &(0x7f0000005480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000020240)={[{@nr_blocks={'nr_blocks', 0x3d, [0x25]}}]}) 16:10:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000200000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000000)=0x7, 0x4) 16:10:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:38 executing program 3: unshare(0x60400) unshare(0x4020000) 16:10:38 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10002, 0x0) [ 1364.454015][T32001] tmpfs: Bad value for 'nr_blocks' 16:10:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000300000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:38 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0, 0xf0ff7f}}, 0x20000040) 16:10:38 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000006a40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[]) [ 1364.480568][T32001] tmpfs: Bad value for 'nr_blocks' 16:10:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:38 executing program 5: pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x2}, 0x0, 0x0, 0x0) 16:10:38 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000004840), 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) 16:10:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000400000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="680000008d2e49"], 0x68}}, 0x0) 16:10:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000000000000100000000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000500000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:39 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "22dcb1814c44e730"}) 16:10:39 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x40044581, 0x0) 16:10:39 executing program 3: setresuid(0xee00, 0xee01, 0x0) r0 = getuid() setresuid(r0, 0x0, 0x0) 16:10:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x9, 0x0, &(0x7f0000000080)) 16:10:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000600000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:39 executing program 5: setresuid(0xee00, 0x0, 0x0) setresuid(0x0, 0xffffffffffffffff, 0x0) 16:10:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001020000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:39 executing program 3: syz_mount_image$tmpfs(&(0x7f0000006a00), &(0x7f0000006a40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000006ac0)) syz_mount_image$tmpfs(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x40820, &(0x7f0000001800)={[], [{@measure}]}) 16:10:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000700000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:39 executing program 1: openat$pidfd(0xffffffffffffff9c, &(0x7f0000001980), 0x228480, 0x0) 16:10:39 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x80044501, &(0x7f0000000080)=""/124) 16:10:39 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f00000002c0)={0x0, 0x0}) ioctl$MON_IOCX_GETX(r0, 0x80089203, 0x0) [ 1365.426263][T32053] tmpfs: Unknown parameter 'measure' 16:10:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000800000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(r0, &(0x7f0000001f40)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001fc0)=ANY=[], 0x4e8}}], 0x1, 0x24000000) 16:10:39 executing program 5: setresuid(0xee00, 0xee01, 0x0) r0 = getuid() setresuid(r0, 0xffffffffffffffff, 0x0) 16:10:39 executing program 1: setresuid(0xee00, 0x0, 0x0) r0 = getuid() setresuid(0x0, r0, 0x0) syslog(0x0, 0x0, 0x0) 16:10:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000900000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:39 executing program 5: waitid(0x4443c2d693d5baed, 0x0, 0x0, 0x4, 0x0) 16:10:39 executing program 3: timer_create(0x3, 0x0, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, r0+10000000}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) 16:10:39 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x48, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x2c, 0x8, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "50bd7adc55e6515adc2e32e9c92967c635b9bdc9bb41ffc1d9f9466f63716443"}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}]}, 0x48}}, 0x0) 16:10:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000a00000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:40 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x5c, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x40, 0x8, 0x0, 0x1, [{0x3c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @private}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40000}, 0x2004844) 16:10:40 executing program 5: request_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0xfffffffffffffffc) 16:10:40 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet_udp_int(r0, 0x11, 0x0, 0x0, 0x0) 16:10:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000b00000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:40 executing program 1: sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0xcbddc238f3d083c1) 16:10:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r0, &(0x7f0000002380)={&(0x7f0000001b40), 0xc, &(0x7f0000002340)={&(0x7f0000001bc0)={0x77c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x4, 0x116, {0x800004}}}}, [@NL80211_ATTR_FRAME={0x181, 0x33, @data_frame={@qos_no_ht={{@type11={{}, {}, @broadcast, @broadcast, @device_b, {}, @broadcast}}, {@type00={{}, {}, @broadcast, @device_b}}}, @random="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"}}, @NL80211_ATTR_FRAME={0x5c1, 0x33, @data_frame={@qos_no_ht={{@type00={{}, {}, @device_b, @device_b, @random="55c6d4ce50ca"}}, {@type10={{}, {}, @random="bf051aabc528", @device_b, @random="5bbb191b6f0f"}}}, @random="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"}}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x77c}, 0x1, 0x0, 0x0, 0x63cae576af08c52e}, 0x80) 16:10:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001060000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:40 executing program 5: syz_mount_image$msdos(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f0000000140)="327da208d6d19a3ddf8c", 0xa, 0x5}, {0x0, 0x0, 0x5ab}], 0x0, &(0x7f0000002900)) 16:10:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000c00000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:40 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000001680)={&(0x7f0000000000)=@abs, 0xffa1, &(0x7f0000001580)=[{&(0x7f0000000500)=""/32, 0x20}, {&(0x7f0000000080)=""/12, 0xc}, {&(0x7f0000000580)=""/4096, 0x1000}], 0x3, &(0x7f00000000c0)=[@cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb8}, 0x0) 16:10:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001070000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:40 executing program 0: setresuid(0xee00, 0x0, 0x0) r0 = getuid() setuid(r0) prctl$PR_SET_UNALIGN(0x18, 0x0) 16:10:40 executing program 5: r0 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x92832, 0xffffffffffffffff, 0x8000000) syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x0, &(0x7f0000000000), 0x0, 0x4) 16:10:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000d00000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001080000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:40 executing program 1: setresuid(0xee00, 0x0, 0x0) r0 = getuid() r1 = getuid() setresuid(0xee01, r0, r1) setuid(r0) [ 1366.473645][T32119] netlink: 1880 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1366.492167][T32125] netlink: 1880 bytes leftover after parsing attributes in process `syz-executor.1'. 16:10:40 executing program 5: setresuid(0xee00, 0x0, 0x0) r0 = getuid() r1 = getuid() setresuid(r0, r0, r1) 16:10:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000e00000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:40 executing program 0: r0 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_gettime(0x2, &(0x7f0000000080)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f00000000c0)={{0x0, r1+10000000}, {0x0, r2+10000000}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}}, 0x0) 16:10:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001090000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:41 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) recvmmsg$unix(r0, &(0x7f00000009c0)=[{{0x0, 0x0, &(0x7f0000000800)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x140, 0x0) 16:10:41 executing program 3: syz_genetlink_get_family_id$net_dm(&(0x7f0000000000), 0xffffffffffffffff) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x193a73, 0xffffffffffffffff, 0x8000000) 16:10:41 executing program 5: io_submit(0x0, 0xffffffffffffff48, 0x0) 16:10:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000f00000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:41 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0xb8, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_PEERS={0x94, 0x8, 0x0, 0x1, [{0x90, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x48, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @remote}}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x76}}]}]}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @private2}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}]}, 0xb8}}, 0x0) 16:10:41 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x2, 0x0, &(0x7f0000000080)) 16:10:41 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 16:10:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f001000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:41 executing program 1: setresuid(0xee00, 0xee01, 0x0) setresuid(0x0, 0x0, 0x0) 16:10:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:41 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 16:10:41 executing program 0: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x40030, 0xffffffffffffffff, 0x8000000) 16:10:41 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x400445a0, 0x0) 16:10:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f001100000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:41 executing program 1: timer_create(0x3, 0x0, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000180)={{}, {0x0, r0+60000000}}, 0x0) timer_create(0x3, 0x0, &(0x7f0000000100)=0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(r1, 0x0, &(0x7f0000000180)={{}, {0x0, r2+60000000}}, 0x0) 16:10:41 executing program 5: io_setup(0x7a1, &(0x7f0000000100)) io_setup(0x4, &(0x7f0000000280)) io_setup(0x64, &(0x7f0000000140)) io_setup(0x802, &(0x7f0000000000)) io_setup(0x4, &(0x7f00000002c0)) 16:10:41 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "1b4e362fb2192ae8ed3c2f6f0ce4c3ea7ce990"}) 16:10:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f0000000000000000010c0000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0xc, 0x0, &(0x7f0000000080)) 16:10:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f001200000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:41 executing program 1: setresuid(0xee00, 0x0, 0x0) r0 = getuid() setfsuid(r0) r1 = getuid() setresuid(0x0, r1, 0x0) 16:10:41 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) mmap$usbmon(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000001, 0x13, r0, 0x0) 16:10:41 executing program 3: syz_mount_image$ext4(&(0x7f0000013500)='ext4\x00', &(0x7f0000013540)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000013dc0)) 16:10:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f0000000000000000010d0000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f001400000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x7, 0x0, &(0x7f0000000080)) 16:10:42 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x5c, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x40, 0x8, 0x0, 0x1, [{0x3c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @private}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}]}, 0x5c}}, 0x0) 16:10:42 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x80284504, 0x0) 16:10:42 executing program 3: unshare(0xa020600) 16:10:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f001800000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:42 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x12042, &(0x7f0000000680)) 16:10:42 executing program 3: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002840), 0x0, &(0x7f0000002900)={[], [], 0xa}) 16:10:42 executing program 0: syz_mount_image$tmpfs(&(0x7f0000006a00), &(0x7f0000006a40)='./file0\x00', 0x0, 0x0, 0x0, 0x45, &(0x7f0000006ac0)) 16:10:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:42 executing program 5: io_setup(0x0, &(0x7f0000000080)) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x92832, 0xffffffffffffffff, 0x8000000) 16:10:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f001900000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:42 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f0000003f80)=[{{&(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}], 0x20}}], 0x1, 0x0) 16:10:42 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x80044584, &(0x7f0000000080)=""/124) 16:10:42 executing program 1: syz_mount_image$tmpfs(&(0x7f0000006a00), &(0x7f0000006a40)='./file0\x00', 0x0, 0x0, 0x0, 0x47, &(0x7f0000006ac0)) 16:10:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f002200000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:42 executing program 5: socketpair(0x0, 0x5ff25da7c9692878, 0x0, 0x0) 16:10:42 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f0000000040)={0x4c, 0x12, 0x1, 0x0, 0x0, {0x2}}, 0x4c}}, 0x0) 16:10:42 executing program 1: select(0x40, &(0x7f0000000600), 0x0, &(0x7f0000004480)={0x4}, &(0x7f00000044c0)) 16:10:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, &(0x7f0000000040)=@nl=@unspec, &(0x7f00000000c0)=0xfffffcc0) 16:10:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:42 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x40084504, 0x0) 16:10:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f002500000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:42 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000004840), 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f00000000c0)={0x0, {0x2, 0x0, @private}, {0x2, 0x0, @remote}, {0x2, 0x0, @dev}}) fcntl$getownex(r0, 0x10, &(0x7f0000000140)) 16:10:42 executing program 3: syz_mount_image$tmpfs(&(0x7f0000006a00), &(0x7f0000006a40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[], [{@seclabel}]}) 16:10:42 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000040)={0xf}, 0xf) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[], 0xe) 16:10:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001120000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f002e00000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:42 executing program 5: syz_mount_image$msdos(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f0000000140)="327da208d6d19a3ddf8ccf7b11cfbf5bf5", 0x11, 0x5}, {0x0, 0x0, 0x5ab}], 0x0, &(0x7f0000002900)) 16:10:42 executing program 3: ioprio_get$uid(0x0, 0xee01) 16:10:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(r0, &(0x7f0000001f40)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @dev, 0x8000}, 0x80, 0x0, 0x0, &(0x7f0000001fc0)=ANY=[], 0x4e8}}], 0x1, 0x24000000) 16:10:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:42 executing program 0: syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f00000012c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000280)='\r', 0x1, 0xfffffffffffff800}], 0x1000000, &(0x7f0000001340)={[{@fat=@fmask={'fmask', 0x3d, 0x3}}, {@dots}, {@fat=@flush}, {@nodots}], [{@obj_role={'obj_role', 0x3d, '#'}}, {@obj_user={'obj_user', 0x3d, '(\x8d#$+'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@uid_eq={'uid', 0x3d, 0xee00}}]}) 16:10:42 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000680)={[{@fat=@nocase}], [{@dont_hash}]}) 16:10:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f004800000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:42 executing program 3: request_key(&(0x7f00000003c0)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, 0x0, 0xfffffffffffffff8) 16:10:42 executing program 1: add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) 16:10:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmsg(r0, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x10142) 16:10:42 executing program 5: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x210900, 0x0) 16:10:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f004c00000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:42 executing program 3: setresuid(0xee00, 0x0, 0x0) r0 = getuid() r1 = getuid() setresuid(r0, r1, 0x0) setfsuid(0x0) 16:10:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:42 executing program 1: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREAD(r0, 0x0, 0xe) 16:10:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f006000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:42 executing program 0: socket(0x1e, 0x0, 0x3) 16:10:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @empty}, 0x10) 16:10:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:42 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000004840), 0x0, 0x0) recvmsg$unix(r0, 0x0, 0x0) 16:10:42 executing program 3: setresuid(0xee00, 0x0, 0x0) r0 = getuid() setresuid(r0, 0xee00, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) 16:10:42 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x9205, 0x0) 16:10:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f006800000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:42 executing program 1: rt_sigqueueinfo(0x0, 0xa, &(0x7f0000000180)={0x0, 0x0, 0x66}) 16:10:42 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 16:10:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 16:10:42 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000340)={{}, {}, [{}], {}, [{}]}, 0x34, 0x0) 16:10:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f006c00000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:42 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) mmap$usbmon(&(0x7f0000ff9000/0x4000)=nil, 0x7fffdf006000, 0x0, 0x13, r0, 0x0) getresuid(&(0x7f0000004200), &(0x7f0000004240), &(0x7f0000004280)) 16:10:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x88, 0x0, 0x0, 0xfffffffffffffffc) 16:10:42 executing program 0: syz_mount_image$tmpfs(&(0x7f0000006a00), &(0x7f0000006a40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000006ac0)={[{@nr_blocks={'nr_blocks', 0x3d, [0x4d]}}]}) 16:10:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = fork() sendmmsg$unix(r0, &(0x7f0000004600)=[{{&(0x7f0000000040)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000044c0)=[@cred={{0x1c, 0x1, 0x2, {r1}}}], 0x20}}], 0x1, 0x0) 16:10:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f007400000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:42 executing program 1: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2002, 0x0, 0x92832, 0xffffffffffffffff, 0x8000000) io_setup(0x6, &(0x7f0000000000)) 16:10:42 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) recvmmsg$unix(r0, 0x0, 0x0, 0x40012060, 0x0) 16:10:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f007a00000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:42 executing program 5: r0 = socket(0x11, 0x2, 0x0) sendmsg$NL80211_CMD_PROBE_CLIENT(r0, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={0x0}}, 0x0) 16:10:42 executing program 0: syz_mount_image$tmpfs(&(0x7f0000006a00), &(0x7f0000006a40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000006ac0)={[{@nr_blocks={'nr_blocks', 0x3d, [0x6d]}}]}) 16:10:42 executing program 0: sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, 0x0, 0xf0379d819fa59fde) 16:10:42 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x0, "aa5564a6a5a7047c681bd84d19ea8b35d613d4dd72942e17ad81581d1051b3537214be86b02683f9cc0a6cf73714b9682030b6defbe0f1a2bb6b534b6f08e7f3"}, 0x48, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000100)='asymmetric\x00', &(0x7f0000000140)=@chain) 16:10:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000302000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:42 executing program 3: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$chown(0x4, r0, 0xffffffffffffffff, 0x0) 16:10:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000100)=@abs={0x1}, 0x6e) 16:10:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000402000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:42 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x0, "aa5564a6a5a7047c681bd84d19ea8b35d613d4dd72942e17ad81581d1051b3537214be86b02683f9cc0a6cf73714b9682030b6defbe0f1a2bb6b534b6f08e7f3"}, 0x48, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, &(0x7f0000000140)=@chain) 16:10:42 executing program 0: pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x2}, &(0x7f0000000200)={0x7}, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={[0x3bb]}, 0x8}) 16:10:42 executing program 1: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000200), 0xffffffffffffffff) r0 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) mmap$usbmon(&(0x7f0000ff9000/0x4000)=nil, 0x7fffdf006000, 0x0, 0x13, r0, 0x0) 16:10:42 executing program 5: setresuid(0xee00, 0x0, 0x0) r0 = getuid() setresuid(0x0, r0, 0x0) timerfd_create(0x8, 0x0) 16:10:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f0000000000000000017a0000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000003000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:43 executing program 0: syz_mount_image$ext4(&(0x7f0000013500)='ext4\x00', &(0x7f0000013540)='./file0\x00', 0x0, 0x0, &(0x7f0000013cc0), 0x881804, &(0x7f0000013dc0)) 16:10:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0xec, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}, @WGDEVICE_A_FWMARK={0x8}, @WGDEVICE_A_PEERS={0x9c, 0x8, 0x0, 0x1, [{0x98, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x2c, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @remote}}, {0x5}}]}]}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "50bd7adc55e6515adc2e32e9c92967c635b9bdc9bb41ffc1d9f9466f63716443"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @private2}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}]}, 0xec}}, 0x0) 16:10:43 executing program 1: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x35, 0x66, 0x30]}, &(0x7f0000000080)={0x0, "aa5564a6a5a7047c681bd84d19ea8b35d613d4dd72942e17ad81581d1051b3537214be86b02683f9cc0a6cf73714b9682030b6defbe0f1a2bb6b534b6f08e7f3"}, 0x48, 0xfffffffffffffffb) 16:10:43 executing program 5: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r1, 0x0, 0x0, 0x0) 16:10:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000203000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:43 executing program 0: getrusage(0x0, &(0x7f0000001300)) 16:10:43 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x40104593, &(0x7f0000000080)=""/124) 16:10:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:43 executing program 5: select(0x0, 0x0, 0x0, 0x0, &(0x7f00000044c0)) 16:10:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00b803000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:43 executing program 3: syz_mount_image$tmpfs(&(0x7f0000006a00), &(0x7f0000006a40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000006ac0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6800, 0x0) 16:10:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) 16:10:43 executing program 1: clock_gettime(0x5ceadca769de673f, 0x0) 16:10:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:43 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000002100)) r0 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) mmap$usbmon(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) 16:10:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00ba03000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:43 executing program 3: add_key$user(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)="b3", 0x1, 0xfffffffffffffffe) 16:10:43 executing program 1: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x92832, 0xffffffffffffffff, 0x8000000) 16:10:43 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x3) 16:10:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:43 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x80, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x64, 0x8, 0x0, 0x1, [{0x60, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x4, 0x4, {0x2, 0x0, @private}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "50bd7adc55e6515adc2e32e9c92967c635b9bdc9bb41ffc1d9f9466f63716443"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}]}, 0x80}}, 0x0) 16:10:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00bb03000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:43 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) recvmsg$unix(r0, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x0) 16:10:43 executing program 1: getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x1d4fc000, 0x0, 0x92832, 0xffffffffffffffff, 0x8000000) 16:10:43 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f0000003f80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 16:10:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00bc03000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001020400000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:43 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) mmap$usbmon(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x113, r0, 0x0) 16:10:43 executing program 0: r0 = socket(0x10, 0x3, 0x2) sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000880)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000840)={0x0}}, 0x0) 16:10:43 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "00b170cf8b52b85c1e81dc13caa16ce1baf7dff39fe0696945c1c2350640a79d2d1a3686d1967e848ba386b4f84792026a0329002cdb4a8a9c5eea483452128c"}, 0x48, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, 0xfffffffffffffffc, 0x0) 16:10:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00bd03000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x0, 0x7800, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}}}}) 16:10:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:43 executing program 3: clock_gettime(0xfffffffffffffffe, 0x0) 16:10:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x54, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x38, 0x8, 0x0, 0x1, [{0x34, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}]}, 0x54}}, 0x0) 16:10:43 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) mmap$usbmon(&(0x7f0000ff9000/0x4000)=nil, 0x7fffdf006000, 0x0, 0x10, r0, 0xffffffff00000000) 16:10:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00be03000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:43 executing program 3: unshare(0x20600) r0 = timerfd_create(0x8, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}}, 0x0) 16:10:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00bf03000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:43 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) 16:10:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:43 executing program 5: io_setup(0x1004, &(0x7f0000000040)=0x0) io_setup(0x4, &(0x7f0000000280)) io_destroy(r0) io_setup(0x8, &(0x7f0000000140)) 16:10:43 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000680)={[{@fat=@nocase}]}) 16:10:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00c003000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:43 executing program 0: syz_mount_image$tmpfs(&(0x7f0000006a00), &(0x7f0000006a40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000006ac0)={[{@nr_blocks={'nr_blocks', 0x3d, [0x74]}}]}) 16:10:43 executing program 1: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000014040)='/proc/self/attr/fscreate\x00', 0x2, 0x0) 16:10:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:43 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x101601, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x4000011, r0, 0x0) 16:10:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00c103000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:43 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00') syz_mount_image$ext4(&(0x7f0000000240)='ext2\x00', &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)) 16:10:43 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000004840), 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x3, 0x11, r0, 0x10000000) 16:10:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:43 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000004840), 0x0, 0x0) recvmmsg$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000001b00)={0x77359400}) 16:10:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0xd, &(0x7f0000000040)={&(0x7f0000ff0000/0xd000)=nil, 0xd000}, &(0x7f0000000080)=0x10) 16:10:43 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f000000dac0)='ext4\x00', &(0x7f000000db00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) 16:10:43 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x240000, 0x0) 16:10:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00f203000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000900000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r3}]}, 0x1c}}, 0x0) 16:10:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 16:10:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00f303000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10, &(0x7f0000000040)=0x1ff, 0x4) 16:10:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:43 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000000c0)='\x00F', 0x2, 0xfff}, {&(0x7f00000001c0)='L', 0x1, 0xffffffff80000000}, {&(0x7f0000000380)="c7", 0x1, 0x10000}], 0x0, 0x0) 16:10:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00f403000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x8002) 16:10:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00f503000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:44 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000004840), 0x0, 0x0) pidfd_send_signal(r0, 0x0, 0x0, 0x0) 16:10:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:44 executing program 3: memfd_create(&(0x7f0000000040)='^\x00', 0x0) 16:10:44 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}}, 0x20000040) 16:10:44 executing program 5: syz_mount_image$tmpfs(&(0x7f0000006a00), &(0x7f0000006a40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x181040, 0x0) 16:10:44 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000006a40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[], [{@seclabel}]}) 16:10:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmmsg$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000480)={0x77359400}) 16:10:44 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x80084502, &(0x7f0000000080)=""/124) 16:10:44 executing program 5: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, r2) 16:10:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00f603000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000100)=0x7, 0x4) 16:10:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:44 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000002f80)={0x1, &(0x7f00000015c0)=[{0x100}]}) 16:10:44 executing program 3: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2002, 0x2, 0x92832, 0xffffffffffffffff, 0x8000000) 16:10:44 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x9, 0x0) mmap$usbmon(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) 16:10:44 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) mmap$usbmon(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x40000) 16:10:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00f703000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:44 executing program 1: io_setup(0x5, &(0x7f0000000000)) io_setup(0xffff, &(0x7f0000000200)) 16:10:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x9, 0x4) 16:10:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:44 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000640)={&(0x7f0000000540), 0xc, &(0x7f0000000680)={&(0x7f00000005c0)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x8}}, ["", ""]}, 0xfffffffffffffe3e}}, 0x0) 16:10:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x58, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_PEERS={0x34, 0x8, 0x0, 0x1, [{0x30, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x8, 0x9, 0x0, 0x1, [{0x4}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}]}, 0x58}}, 0x0) 16:10:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000204000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:44 executing program 3: setresuid(0xee00, 0x0, 0x0) r0 = getuid() setresuid(0x0, r0, 0x0) setresuid(r0, r0, r0) 16:10:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000f00000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:44 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind(r0, &(0x7f0000000580)=@xdp, 0x80) 16:10:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000604000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:44 executing program 5: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f00000012c0)=[{&(0x7f0000000080)="9f46", 0x2, 0x1}], 0x0, 0x0) 16:10:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x48}}, 0x0) 16:10:44 executing program 1: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x193a73, 0xffffffffffffffff, 0x8000000) 16:10:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x110, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}, @WGDEVICE_A_FWMARK={0x8}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_PEERS={0xb8, 0x8, 0x0, 0x1, [{0xb4, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x48, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @remote}}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x76}}]}]}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "50bd7adc55e6515adc2e32e9c92967c635b9bdc9bb41ffc1d9f9466f63716443"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @private2}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}]}, 0x110}}, 0x0) 16:10:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) getsockname(r0, 0x0, &(0x7f00000000c0)) 16:10:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x1e, 0x0, &(0x7f0000000080)) 16:10:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000005000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:44 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=ANY=[@ANYBLOB="84"], 0x1084}}, 0x0) 16:10:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000001b40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="10"], 0x10}}], 0x1, 0x0) 16:10:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000006000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:44 executing program 5: r0 = getpid() migrate_pages(r0, 0x7, 0x0, &(0x7f0000000040)=0x101) 16:10:44 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000100)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "9c41c626a4e46f080ebd7ca75790a054856f2c71e4eb49b1005ba5a08544208fd9f050b7aab5ad336d88ddf172eedcfc178868c394001679d77858dfbefb909d"}, 0x48, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040), 0x0, 0x0, 0x0, r0) 16:10:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001001200000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000406000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:44 executing program 0: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @multicast2}, @can, 0x5}) 16:10:44 executing program 5: io_uring_setup(0x2eb5, &(0x7f0000000180)={0x0, 0x0, 0x20}) [ 1370.473564][T32690] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=32690 comm=syz-executor.3 16:10:44 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x48}}, 0x0) 16:10:44 executing program 3: keyctl$search(0xa, 0x0, &(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0) 16:10:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000007000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3, 0x1, 0x401, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x4}]}, 0x18}}, 0x0) 16:10:44 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) recvmsg$unix(r0, &(0x7f0000003580)={0x0, 0x0, &(0x7f0000003480)=[{0xffffffffffffffff}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x18}, 0x0) 16:10:44 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x28}]}) 16:10:44 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000540)) 16:10:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000009000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)={{0x14}, [@NFT_MSG_DELSET={0x20, 0xb, 0xa, 0x201, 0x0, 0x0, {0xa}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x48}}, 0x0) 16:10:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:45 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000840)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 16:10:45 executing program 1: semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000280)=""/219) getresgid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)) 16:10:45 executing program 3: syz_open_dev$usbmon(&(0x7f0000000000), 0x1, 0x90841) 16:10:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000a000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x24, 0x1, 0x4, 0x301, 0x0, 0x0, {}, [@NFULA_CFG_TIMEOUT={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x24}}, 0x0) 16:10:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="a80100000001010100000000000000000a0000009c0002800c000280050001003a00000014000180050001"], 0x1a8}}, 0x0) 16:10:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:45 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockname(r0, &(0x7f0000000140)=@pppol2tpv3in6, &(0x7f0000000080)=0xfffffffffffffc5c) 16:10:45 executing program 0: r0 = socket(0x10, 0x2, 0x0) recvfrom(r0, 0x0, 0x0, 0x10006, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) 16:10:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00900a000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, 0x1, 0x4, 0x401, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5}]}, 0x1c}}, 0x0) 16:10:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000004d00)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x10}}, [], {0x14}}, 0x28}}, 0x0) 16:10:45 executing program 3: r0 = semget$private(0x0, 0x6, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x0, 0x0, 0x1000}], 0x1, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1800}], 0x1, 0x0) 16:10:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000b000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 1370.726294][T32743] netlink: 248 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1370.739570][T32743] netlink: 120 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1370.749020][T32743] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1370.758242][T32743] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 16:10:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:45 executing program 1: pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0)={0x7}, 0x0, 0x0, 0x0) 16:10:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000c000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001002500000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:45 executing program 3: syz_io_uring_setup(0x757f, &(0x7f0000000140)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) 16:10:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername(r0, &(0x7f00000003c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000440)=0xfffffffffffffed1) 16:10:45 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000080), r0) 16:10:45 executing program 1: r0 = add_key$keyring(&(0x7f0000001080), &(0x7f00000010c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000001140)='C', 0x1, r0) 16:10:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000d000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="a80100000201010100000000000000000a0000009c0002"], 0x1a8}}, 0x0) 16:10:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001172800000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:45 executing program 1: add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0x0) 16:10:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x5411, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @empty}, @l2tp={0x2, 0x0, @local}, @can}) 16:10:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000e000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:45 executing program 0: r0 = semget$private(0x0, 0x6, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x0, 0x0, 0x1000}, {}], 0x2, 0x0) 16:10:45 executing program 3: syz_open_dev$evdev(&(0x7f0000001d80), 0xc73, 0x4200) 16:10:45 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x89e0, &(0x7f0000000040)={'vcan0\x00'}) 16:10:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000f000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:45 executing program 0: semget(0x3, 0x56c9ab24d6a26798, 0x0) 16:10:45 executing program 5: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x5, 0x0, 0x0, 0x0, 0x8}) 16:10:45 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0xa, &(0x7f0000000040)=0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(r1, 0x2, &(0x7f0000000380)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}]) [ 1370.953189][ T319] netlink: 248 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1370.981773][ T319] netlink: 152 bytes leftover after parsing attributes in process `syz-executor.5'. 16:10:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001003f00000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:45 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f00000000c0)=0x23fd, 0x4) 16:10:45 executing program 3: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0xc013, r0, 0x10000000) 16:10:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x201, 0x0, 0x0, {0x2}, [@CTA_EXPECT_MASTER={0x4}]}, 0x18}}, 0x0) 16:10:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f002010000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:45 executing program 0: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x5452, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @local}, @can}) 16:10:45 executing program 3: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) 16:10:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000011000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x24, 0x1, 0x4, 0x5, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0x1000}]}, 0x24}}, 0x0) 16:10:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SOCK_DESTROY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)={0x18, 0x15, 0x1, 0x0, 0x0, {0x2}, [@INET_DIAG_REQ_BYTECODE={0x4, 0x2}]}, 0x18}}, 0x0) 16:10:45 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f00000006c0)={0x14, 0x453, 0x400, 0x0, 0x0, "b2"}, 0x14}}, 0x0) 16:10:45 executing program 3: pselect6(0x40, &(0x7f0000000000)={0x5}, &(0x7f0000000040)={0x5}, &(0x7f0000000080), 0x0, &(0x7f0000000140)={&(0x7f0000000100)={[0x40]}, 0x8}) 16:10:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000012000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:45 executing program 0: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0xb, 0x0, 0x0) 16:10:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:45 executing program 3: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0x3, 0x700, 0x0) 16:10:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000002b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000010"], 0x3c}}, 0x0) 16:10:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000014000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:45 executing program 1: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890c, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @empty}, @can, 0x5}) [ 1371.187230][ T24] audit: type=1107 audit(1628352645.560:347): pid=365 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='²' 16:10:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001006000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:45 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x6c4901, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, 0x0) 16:10:45 executing program 3: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @remote}, @can, 0x5}) 16:10:45 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002b40)={&(0x7f00000013c0), 0xc, &(0x7f0000002b00)={&(0x7f00000027c0)=@getpolicy={0x98, 0x15, 0x1, 0x0, 0x0, {{@in=@empty}}, [@algo_auth={0x48, 0x1, {{'blake2s-160\x00'}}}]}, 0x98}}, 0x0) 16:10:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000018000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000019000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:45 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8917, &(0x7f0000000040)={'vcan0\x00'}) 16:10:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001006c00000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:45 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) io_destroy(0x0) 16:10:45 executing program 1: setuid(0xee01) open(&(0x7f0000000040)='./file0\x00', 0x1494c2, 0x0) 16:10:45 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x891b, &(0x7f0000000040)={'vcan0\x00'}) 16:10:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00001f000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:45 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x541b, &(0x7f0000000040)={'batadv_slave_0\x00'}) 16:10:45 executing program 3: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0x0, 0xee00}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) 16:10:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000020000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:45 executing program 0: r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000700)={{0x2, 0x0, 0x0, 0x0, 0xee00}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}) 16:10:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001007a00000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) r2 = epoll_create(0x3) io_submit(r1, 0x2, &(0x7f0000000380)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x0, r2, 0x0}]) 16:10:45 executing program 1: pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000180)={0x77359400}, 0x0) 16:10:45 executing program 5: io_uring_setup(0x80366a, &(0x7f0000000040)={0x0, 0x0, 0x10}) 16:10:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) 16:10:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f001020000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0xa, &(0x7f0000000040)=0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) io_submit(r1, 0x2, &(0x7f00000003c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x7}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x3, 0x0, r2, &(0x7f00000001c0)}]) 16:10:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000004d00)={{0x14, 0x2}, [@NFT_MSG_NEWSETELEM={0x14, 0xc, 0xb, 0x401}], {0x14}}, 0x3c}}, 0x0) 16:10:45 executing program 3: r0 = io_uring_setup(0x2ac9, &(0x7f0000000080)) rt_sigsuspend(&(0x7f0000000000), 0x8) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x100000, 0x0, 0x13, r0, 0x10000000) 16:10:45 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000340), r0) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000005c0)={0x20, r2, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc}]}, 0x20}}, 0x0) 16:10:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000022000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:45 executing program 1: r0 = getpid() get_robust_list(r0, &(0x7f0000000380)=0x0, &(0x7f00000003c0)) 16:10:46 executing program 5: semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{}], 0x1, 0x0) 16:10:46 executing program 0: r0 = socket(0x11, 0x2, 0x0) setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, 0x0, 0x0) 16:10:46 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000140)) 16:10:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f005f24000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:46 executing program 0: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x12, r0, 0x0) 16:10:46 executing program 1: syz_mount_image$tmpfs(&(0x7f0000004400), &(0x7f0000004440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000056c0)) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x80000, &(0x7f0000003480)) 16:10:46 executing program 5: syz_mount_image$tmpfs(&(0x7f00000095c0), &(0x7f0000009600)='./file0\x00', 0x0, 0x0, 0x0, 0x8100, &(0x7f000000acc0)) 16:10:46 executing program 0: r0 = semget$private(0x0, 0x6, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x0, 0x100}, {}], 0x2, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x3, 0x1800}], 0x1, 0x0) 16:10:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:46 executing program 3: r0 = syz_io_uring_setup(0x7c28, &(0x7f0000000200)={0x0, 0x9f5c}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) syz_io_uring_setup(0x54fc, &(0x7f0000000040)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) 16:10:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000025000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:46 executing program 1: r0 = socket(0x11, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8981, 0x0) 16:10:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00002e000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x16}]}) 16:10:46 executing program 3: timer_create(0x0, 0x0, &(0x7f0000001340)) timer_gettime(0x0, &(0x7f0000001300)) 16:10:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:46 executing program 3: io_setup(0x7, &(0x7f0000000000)=0x0) io_setup(0x3, &(0x7f0000000080)=0x0) io_destroy(r1) io_destroy(r0) 16:10:46 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r0, 0x0, 0xfffffffffffffd5d, 0x10041, 0x0, 0x0) [ 1372.509365][ T24] audit: type=1326 audit(1628352646.880:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=501 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 16:10:47 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0), r0) sendmsg$NBD_CMD_STATUS(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x28, r2, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_INDEX={0x10, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8}]}]}, 0x28}}, 0x0) 16:10:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00003f000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:47 executing program 1: timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000001340)) timer_gettime(0x0, &(0x7f0000001300)) 16:10:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:47 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYBLOB="e4a29d"], 0x2c}}, 0x0) 16:10:47 executing program 3: r0 = socket(0x11, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8953, 0x0) 16:10:47 executing program 3: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0x2, 0x0, 0x0) 16:10:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:47 executing program 5: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000003680), 0x4, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000038c0), r1) sendmsg$NFT_MSG_GETRULE(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x84, 0x7, 0xa, 0x201, 0x0, 0x0, {0xc, 0x0, 0x4}, [@NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x3}, @NFTA_RULE_USERDATA={0x55, 0x7, 0x1, 0x0, "44e750412c63ad3c9ae88a8dc60952fd6ea2f3474507da7fcf3fd4091ed8298a16827f3d1abb863611f61b96b6f44aea3294a36b873263cd4b5a3ca42403c9fadfba8b4779656d873317347d0ec1ce416f"}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x5}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @empty}, @l2tp={0x2, 0x0, @local, 0x2}, @can, 0x205}) 16:10:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000040000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:47 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "ec38d0efbd6509ac47af66d38400de72f03403d3c9f1f13ad63ff44af42e37b01c3e627c1058215ce11dafcd9d988d19fa674197d3c67c79878d5dffeae6bde2"}, 0x48, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000140), 0x0, 0x0, 0x0, r0) 16:10:47 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 16:10:47 executing program 5: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x100000, 0x0, 0x13, r0, 0x10000000) r1 = io_uring_setup(0x276c, &(0x7f0000000040)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) 16:10:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000048000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x20, 0x0, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4}, @CTA_EXPECT_TUPLE={0x4}, @CTA_EXPECT_MASK={0x4}]}, 0x20}}, 0x0) 16:10:47 executing program 3: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)=[0xa4dd]) 16:10:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00004c000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:47 executing program 0: pselect6(0x40, &(0x7f0000000000)={0x5}, &(0x7f0000000040)={0x5}, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)={&(0x7f0000000100)={[0x40]}, 0x8}) 16:10:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:47 executing program 1: syz_mount_image$tmpfs(&(0x7f0000004400), &(0x7f0000004440)='./file0\x00', 0x0, 0x0, 0x0, 0x500, &(0x7f00000056c0)) 16:10:47 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)) 16:10:47 executing program 5: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x100000, 0x4, 0x13, r0, 0x10000000) 16:10:47 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000fc000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020800034000000014b8000980b40002800c00018008000140000000000c00018008000140000000003c000180080001"], 0x144}}, 0x0) r1 = gettid() tkill(r1, 0x1e) 16:10:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00245f000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000002b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000"], 0x3c}}, 0x0) 16:10:47 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = io_uring_setup(0x2ec3, &(0x7f0000000080)={0x0, 0x0, 0x2}) dup2(r0, r1) 16:10:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'macvtap0\x00'}) 16:10:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000060000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:47 executing program 0: r0 = syz_io_uring_setup(0x7c28, &(0x7f0000000200)={0x0, 0x9f5c, 0x0, 0x0, 0x13c}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) syz_io_uring_setup(0x54fc, &(0x7f0000000040)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) 16:10:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000068000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00006c000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:48 executing program 3: keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000100)=""/4096, 0x1000) 16:10:48 executing program 5: syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x408100) 16:10:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:48 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000180), r0) 16:10:48 executing program 0: syz_io_uring_setup(0x569, &(0x7f0000000140)={0x0, 0x6d61, 0x2a}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) 16:10:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000004d00)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0xb}}, [], {0x14}}, 0x28}}, 0x0) 16:10:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000074000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:48 executing program 5: clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) select(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x3}, &(0x7f0000000200)={0x0, r0/1000+60000}) 16:10:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:48 executing program 3: r0 = semget(0x1, 0x0, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000040)=""/56) 16:10:48 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 16:10:48 executing program 0: r0 = semget$private(0x0, 0x6, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x0, 0x100}, {}], 0x2, &(0x7f0000000180)={0x77359400}) 16:10:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00007a000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000000080000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:48 executing program 3: r0 = semget$private(0x0, 0x2, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0xee00, 0x0, 0x0, 0xee01}}) 16:10:48 executing program 1: r0 = io_uring_setup(0x6809, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x8, 0x0, 0x0) 16:10:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000a90000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x58, 0x3, 0xa, 0x301, 0x0, 0x0, {0x2, 0x0, 0x9}, [@NFTA_CHAIN_HOOK={0x30, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x3b3b38fa}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x23f91f46}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x7d30a9e7}, @NFTA_HOOK_DEV={0x14, 0x3, 'batadv_slave_0\x00'}]}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x2}]}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0xa0}}, 0x0) 16:10:48 executing program 5: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0x8, 0x700, 0x0) 16:10:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0003b8000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:48 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f0000000280)=[{&(0x7f0000000080)=""/229, 0xe5}], 0x1, &(0x7f0000000480)=[{&(0x7f0000000500)=""/102400, 0x19000}], 0x1, 0x0) 16:10:48 executing program 0: io_uring_setup(0x6c50, &(0x7f00000001c0)={0x0, 0x6a71}) 16:10:48 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000280), 0x570, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f00000002c0)) 16:10:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0003ba000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:48 executing program 1: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x12, r0, 0x0) syz_io_uring_complete(r1) 16:10:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:48 executing program 5: memfd_create(&(0x7f0000000100)='!%]--$*](S%\x00', 0x0) 16:10:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0003bb000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:49 executing program 3: process_vm_writev(0x0, &(0x7f00000004c0)=[{&(0x7f0000000040)=""/252, 0xfc}, {&(0x7f0000000140)=""/126, 0x7e}, {&(0x7f00000001c0)=""/50, 0x32}, {&(0x7f0000001680)=""/75, 0x4b}, {&(0x7f0000000280)=""/220, 0xdc}, {&(0x7f0000000380)=""/112, 0x70}, {&(0x7f0000000400)=""/192, 0xc0}], 0x7, &(0x7f0000001640)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/125, 0x7d}, {&(0x7f00000015c0)=""/124, 0xfffffffffffffffd}], 0x3, 0x0) 16:10:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:49 executing program 5: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0x5, 0x0, 0x0) 16:10:49 executing program 1: capget(&(0x7f0000000780)={0x20071026}, &(0x7f00000007c0)) 16:10:49 executing program 3: r0 = semget$private(0x0, 0x6, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x0, 0x0, 0x1000}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x4}, {0x1, 0xf6}, {0x0, 0x3, 0x1800}], 0x3, &(0x7f0000000040)) 16:10:49 executing program 0: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) fork() pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) 16:10:49 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 16:10:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:49 executing program 5: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) syz_io_uring_submit(r1, 0x0, 0x0, 0x0) 16:10:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0003bc000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:49 executing program 3: syz_io_uring_setup(0x155f, &(0x7f0000000040), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) 16:10:49 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x0, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0xe8) 16:10:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:49 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="19000000", @ANYRES16, @ANYBLOB="c1"], 0x1c}}, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), r0) 16:10:49 executing program 3: memfd_create(&(0x7f0000000100)='!%]--$*](S%\x00', 0x5) 16:10:49 executing program 0: syz_io_uring_setup(0x7c28, &(0x7f0000000200)={0x0, 0x9f5c}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) r0 = syz_io_uring_setup(0x54fc, &(0x7f0000000040), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) 16:10:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0003bd000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:49 executing program 5: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0x3, 0x0, 0x0) 16:10:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0003be000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:49 executing program 3: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, 0x0) 16:10:49 executing program 1: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x5411, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @local}, @can}) 16:10:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:49 executing program 5: ioprio_set$uid(0x0, 0xee01, 0x4004) 16:10:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_ASSOCIATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16, @ANYBLOB="01"], 0x38}}, 0x0) 16:10:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0003bf000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x58, 0x3, 0xa, 0x301, 0x0, 0x0, {0x2, 0x0, 0x9}, [@NFTA_CHAIN_HOOK={0x30, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x3b3b38fa}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x23f91f46}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x7d30a9e7}, @NFTA_HOOK_DEV={0x14, 0x3, 'batadv_slave_0\x00'}]}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x2}]}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0xa0}}, 0x0) 16:10:49 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x8, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}}) 16:10:49 executing program 5: ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) fork() 16:10:49 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f00000006c0)={0x14, 0x453, 0x400, 0x70bd29, 0x0, "b2"}, 0x14}}, 0x0) 16:10:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0003c0000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:49 executing program 0: pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x2}, &(0x7f0000000180), 0x0) 16:10:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:49 executing program 1: syz_io_uring_setup(0x4cc1, &(0x7f0000000000)={0x0, 0xb791}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000000080)) [ 1375.011263][ T745] 9pnet: Insufficient options for proto=fd 16:10:49 executing program 5: getcwd(&(0x7f0000000040)=""/92, 0x5c) 16:10:49 executing program 3: syz_mount_image$tmpfs(&(0x7f0000004400), &(0x7f0000004440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000056c0)) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000033c0)=[{&(0x7f0000000100)="ee", 0x1}, {&(0x7f00000001c0)="9cb9e178cfa44c2d069dc5be54de3bf4bf809cdfe3c4db5199f90bd261a27e1b4bb42829dbfa84c6d89c0e498bc035cb6082d4601bd9f536db61f9ab7caf6e2cdeed58f384419115f3ad750abd92a4221ed83a94e81148c04380eb5bdf5cb61d66391fd2ad43096bae943ca37834c331351d160ba987e660804b6a192643c37bcb63893dbfe7bae23a0dbb45899397eb857f56895144ae9199043b745f9ec69d1f096f0714a0ee213bafbea651f4200ea8dad6df5eafa6ce90185257761f35370c8ba4ca3dfe9ca99132a46abd8affe997b3bfd12d26c6a6b8c26ea2d07fed3c7f1941229fdd391b4a691bcaa5cf2aaef57a09fcc45c69bb6e310a6d2892ffb9a815ea37f0da69c1eed4e5a1b5f96441ff993c0d4a1955cc44a335a8b4d3021d9301b47ddfec0ce19c10e3244aaffd0768952df1e72ed203defd2be528938b2449364bd7e5cf3ebe84e2b5f2c7ff606f0647a56d9bcc93ef7ccfcfdddc7800cb0843cc45afcec317626aa6636a71fd6ac840c7522e50788224b8b1b3ac33741b5f042cd332911dde2087675c2cb6d8b091d592cadc87d075391d5c33eafeb48d72f42e96c5f70b4c271d3563777647b4e6f4e08b3bfd383cf74ec6689dc11dc50294ecdec1573112c51154ac1681c8f0b31cf548bee653b0605e4e0b77e46675406c9c9a1e00952adb1da6e0000ed61fb90db475ef56881a2a8a7d8540834b7c", 0x200, 0xfffffffffffffe01}], 0x80000, &(0x7f0000003480)) 16:10:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0003c1000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:49 executing program 0: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x100000, 0x0, 0x13, r0, 0x10000000) 16:10:49 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(0xffffffffffffffff, 0x0, 0x20000000) syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14}, 0x14}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SET_MACPARAMS(0xffffffffffffffff, 0x0, 0x200000c1) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000340), r0) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000440)={&(0x7f0000000300), 0xc, &(0x7f0000000400)={&(0x7f00000005c0)={0x74, r2, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6}, @NBD_ATTR_INDEX={0x0, 0x1, 0x0}]}, 0x74}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) [ 1375.049804][ T24] audit: type=1107 audit(1628352649.420:349): pid=746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='²' [ 1375.080077][ T24] audit: type=1107 audit(1628352649.440:350): pid=746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='²' 16:10:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00c0ed000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:49 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/131) 16:10:49 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000600)={0x2c, 0x3, 0x1, 0x3, 0x0, 0x0, {}, [@CTA_LABELS_MASK={0x18, 0x17, [0x0, 0x0, 0x0, 0x0, 0x0]}]}, 0x2c}}, 0x0) 16:10:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0003f2000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:49 executing program 0: sched_setscheduler(0x0, 0x0, &(0x7f0000000140)) 16:10:49 executing program 3: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0xee00, 0x0, 0x0, 0xee01}}) 16:10:49 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="a8010000000101010000000000000000020000009c0002800c000280050001003a000000140001"], 0x1a8}}, 0x0) 16:10:49 executing program 0: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @local={0xac, 0x14, 0x7}}, @can, 0x5}) 16:10:49 executing program 5: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x3, 0x0, 0xee01}}) 16:10:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0003f3000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:49 executing program 3: pselect6(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)={&(0x7f0000000100)={[0x40]}, 0x8}) 16:10:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0003f4000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 1375.285643][ T795] netlink: 248 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1375.315572][ T795] netlink: 120 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1375.324994][ T795] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 16:10:49 executing program 5: clock_gettime(0x0, &(0x7f00000001c0)) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 16:10:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:49 executing program 0: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) r1 = io_uring_setup(0x276c, &(0x7f0000000040)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x10000000) 16:10:49 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0xffffffffffffff6a}}, 0x0) 16:10:49 executing program 1: r0 = semget$private(0x0, 0x6, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x0, 0x100}, {}], 0x2, 0x0) semtimedop(r0, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:10:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0003f5000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 1375.334323][ T795] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 16:10:49 executing program 5: r0 = semget$private(0x0, 0x6, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x0, 0x0, 0x1000}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x3, 0x1800}, {}], 0x2, &(0x7f0000000040)) 16:10:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:49 executing program 3: r0 = getpid() capget(&(0x7f0000000780)={0x20071026, r0}, &(0x7f00000007c0)) 16:10:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0003f6000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:49 executing program 0: r0 = socket(0x10, 0x2, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="4c000000030801"], 0x4c}}, 0x0) 16:10:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:49 executing program 3: capget(0x0, &(0x7f00000007c0)) 16:10:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0003f7000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:49 executing program 3: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0xa, 0x0, r1) [ 1375.523315][ T845] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2051 sclass=netlink_route_socket pid=845 comm=syz-executor.0 [ 1375.536587][ T845] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2051 sclass=netlink_route_socket pid=845 comm=syz-executor.0 16:10:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x3}]}) 16:10:50 executing program 5: r0 = semget$private(0x0, 0x6, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x4}, {}, {}], 0x3, &(0x7f0000000040)) 16:10:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000000400000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000fff000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:50 executing program 3: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140), 0x41c682, 0x0) 16:10:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x453, 0x0, 0x0, 0x0, "d3"}, 0x14}}, 0x0) 16:10:50 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000280), r0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000000400)={&(0x7f0000000240), 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0x84, r2, 0x9, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @local}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'bridge0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:ifconfig_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @private}]}, 0x84}}, 0x0) 16:10:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000020000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create(0x3) dup2(r0, r1) 16:10:50 executing program 5: r0 = socket(0x11, 0xa, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 16:10:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) [ 1376.292965][ T24] audit: type=1107 audit(1628352650.660:351): pid=853 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='Ó' 16:10:50 executing program 3: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x100000, 0x0, 0x13, r0, 0x10000000) 16:10:50 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x210080, 0x0) 16:10:50 executing program 5: r0 = socket(0x10, 0x2, 0x9) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) 16:10:50 executing program 0: r0 = semget$private(0x0, 0x6, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)) 16:10:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:50 executing program 1: r0 = semget$private(0x0, 0x6, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x0, 0x0, 0x1000}], 0x1, 0x0) 16:10:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00ffff030000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:50 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000280), 0x24080, 0x0) 16:10:50 executing program 0: wait4(0x0, 0x0, 0x20000001, 0x0) 16:10:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000040000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:50 executing program 1: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x2}, 0x8, 0x0) 16:10:50 executing program 5: io_uring_setup(0x5c13, &(0x7f0000000180)={0x0, 0x8d09, 0x8}) [ 1376.449431][ T888] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=888 comm=syz-executor.5 16:10:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0xa, &(0x7f0000000040)=0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) io_submit(r1, 0x2, &(0x7f00000003c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x7}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x8, r2, 0x0, 0x0, 0x0, 0x0, 0x2}]) 16:10:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:50 executing program 5: io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) 16:10:50 executing program 0: io_uring_setup(0x6c50, &(0x7f00000001c0)={0x0, 0x0, 0x10, 0x3}) 16:10:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000140000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:50 executing program 1: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) fork() fork() mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x10000000) 16:10:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="a801000003010101"], 0x1a8}}, 0x0) 16:10:51 executing program 5: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x8, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000, 0x6}) 16:10:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00ffff1f0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f000000f980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) connect$inet(r3, 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000fc000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000020800034000000014b8000980b40002800c00018008000140000000000c00018008000140000000003c000180080001"], 0x144}}, 0x0) recvmmsg(r4, 0x0, 0x0, 0x10020, &(0x7f0000006200)={0x0, 0x3938700}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r1, 0x0, 0x10003, 0x0) dup2(0xffffffffffffffff, r2) 16:10:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:51 executing program 3: r0 = semget$private(0x0, 0x6, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x4}, {0x1, 0xf6}], 0x2, &(0x7f0000000040)) 16:10:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00ffffe00000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:51 executing program 5: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x8, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000, 0x6}) [ 1376.662562][ T923] netlink: 404 bytes leftover after parsing attributes in process `syz-executor.0'. 16:10:51 executing program 3: memfd_create(&(0x7f0000000540)='syz0\x00', 0x7) 16:10:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:51 executing program 5: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x8, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000, 0x6}) 16:10:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000100000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140), 0x4) 16:10:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)={{0x14}, [@NFT_MSG_DELRULE={0x20, 0x8, 0xa, 0x101, 0x0, 0x0, {}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x48}}, 0x0) 16:10:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000200000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:51 executing program 5: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x8, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000, 0x6}) 16:10:51 executing program 3: io_setup(0x0, &(0x7f00000000c0)) 16:10:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:51 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1d, &(0x7f0000000000)=[{}]}) 16:10:51 executing program 0: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x8953, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @local}, @can}) 16:10:51 executing program 1: syz_open_dev$rtc(&(0x7f0000000380), 0x0, 0x2) 16:10:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000c0a000a00000000000000000000000048000000140a030000000000000000000a0000010900010073797a30000000000c00064000000000000000020c0006400000000000000004080003"], 0x84}}, 0x0) 16:10:51 executing program 3: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0xa, 0x2, 0x0) 16:10:52 executing program 5: ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x8, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000, 0x6}) 16:10:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000040200000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:52 executing program 5: ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x8, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000, 0x6}) 16:10:52 executing program 1: r0 = semget$private(0x0, 0x6, 0x0) semtimedop(r0, &(0x7f0000000000)=[{}, {}], 0x2, 0x0) 16:10:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000300000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:52 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x144}}, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000000, 0x4000010, r0, 0x9eb71000) r1 = gettid() tkill(r1, 0x1e) 16:10:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000004d00)=ANY=[@ANYBLOB="1400000010"], 0x28}}, 0x0) clock_gettime(0x0, &(0x7f0000008c80)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000008b00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000008cc0)={0x0, r1+60000000}) 16:10:52 executing program 5: ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x8, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000, 0x6}) 16:10:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000020300000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:52 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) 16:10:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000080)) 16:10:52 executing program 0: sendmsg$NL802154_CMD_SET_LBT_MODE(0xffffffffffffffff, 0x0, 0x0) 16:10:52 executing program 5: r0 = socket(0x0, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x8, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000, 0x6}) 16:10:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000400000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:52 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x4, 0x0, 0x28) 16:10:52 executing program 3: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) fork() mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x10000000) 16:10:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:52 executing program 0: syz_io_uring_setup(0x757f, &(0x7f0000000140)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, 0x0) 16:10:52 executing program 5: r0 = socket(0x0, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x8, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000, 0x6}) 16:10:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000500000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001fffffdfd0000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:52 executing program 1: timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000001340)) timer_gettime(0x0, 0x0) 16:10:52 executing program 5: r0 = socket(0x0, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x8, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000, 0x6}) 16:10:52 executing program 0: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0x5, 0x700, 0x0) 16:10:52 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='-,%+\x00') 16:10:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000600000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:52 executing program 5: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x8, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000, 0x6}) 16:10:52 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='-,%+\x00') 16:10:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:52 executing program 1: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "ec38d0efbd6509ac47af66d38400de72f03403d3c9f1f13ad63ff44af42e37b01c3e627c1058215ce11dafcd9d988d19fa674197d3c67c79878d5dffeae6bde2"}, 0x48, 0xffffffffffffffff) 16:10:52 executing program 0: syz_mount_image$tmpfs(&(0x7f0000004400), &(0x7f0000004440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='r']) setxattr$incfs_metadata(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000180)="e51275da03e9ac8110824c94bac4a953bcabb262b35a2a41b6aabbbf88", 0x1d, 0x0) 16:10:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000040600000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:52 executing program 5: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x8, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000, 0x6}) 16:10:52 executing program 3: mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x40830, 0xffffffffffffffff, 0x10000000) 16:10:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) [ 1378.122078][ T1077] tmpfs: Unknown parameter 'r' 16:10:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000700000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:52 executing program 1: socketpair(0x2, 0x802, 0x1, &(0x7f0000000180)) 16:10:52 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x2, 0xc6540) 16:10:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001fffffbff0000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:52 executing program 5: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x8, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000, 0x6}) [ 1378.150186][ T1077] tmpfs: Unknown parameter 'r' 16:10:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:52 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000340), r0) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000440)={&(0x7f0000000300), 0xc, &(0x7f0000000400)={&(0x7f00000005c0)={0x74, r2, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}, @NBD_ATTR_TIMEOUT={0xc}, @NBD_ATTR_INDEX={0x0, 0x1, 0x0}]}, 0x74}}, 0x0) 16:10:52 executing program 5: socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x8, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000, 0x6}) 16:10:52 executing program 3: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x7ffffffff000, 0x0, 0x10, r0, 0x10000000) 16:10:52 executing program 1: getresgid(&(0x7f00000000c0), 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000240)) 16:10:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00ffffee0700000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:52 executing program 3: syz_io_uring_setup(0x4cc1, &(0x7f0000000000), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000180), 0x0) 16:10:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:52 executing program 5: socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x8, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000, 0x6}) 16:10:52 executing program 0: syz_mount_image$tmpfs(&(0x7f0000004400), &(0x7f0000004440)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f00000056c0)) 16:10:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000800000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:52 executing program 1: pselect6(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0), &(0x7f0000000140)={&(0x7f0000000100)={[0x40]}, 0x8}) 16:10:52 executing program 3: process_vm_writev(0xffffffffffffffff, &(0x7f0000000680)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x0) 16:10:52 executing program 5: socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x8, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000, 0x6}) 16:10:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000900000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:52 executing program 0: syz_genetlink_get_family_id$nbd(&(0x7f0000000180), 0xffffffffffffffff) 16:10:52 executing program 1: io_uring_setup(0x276e, &(0x7f0000000040)={0x0, 0x40000, 0x18}) 16:10:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f0000000000000000017fffffff0000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:52 executing program 3: io_uring_setup(0x27ac, &(0x7f0000000040)={0x0, 0x0, 0x2, 0x0, 0xfffffffc}) 16:10:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000a00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:52 executing program 5: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 16:10:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xf) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000180)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x4, 0x6, 0x3}, 0x14}}, 0x0) 16:10:52 executing program 1: r0 = semget$private(0x0, 0x6, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x0, 0x100}, {}], 0x2, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x4}, {}], 0x2, &(0x7f0000000040)) 16:10:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:52 executing program 3: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @local={0xac, 0x10}}, @can, 0x5}) 16:10:52 executing program 5: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 16:10:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000b00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:52 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000080)='user\x00', &(0x7f00000000c0)='\x00') 16:10:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000c00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:53 executing program 3: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8982, &(0x7f0000000140)={0x7, 'lo\x00'}) 16:10:53 executing program 5: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 16:10:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000d00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:53 executing program 0: r0 = semget$private(0x0, 0x1, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000100)=""/4096) 16:10:53 executing program 1: r0 = fork() sched_setscheduler(r0, 0x0, &(0x7f0000000140)) 16:10:53 executing program 3: io_uring_setup(0x0, &(0x7f00000001c0)) 16:10:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000e00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:53 executing program 5: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000, 0x6}) 16:10:53 executing program 0: r0 = semget$private(0x0, 0x6, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x0, 0x0, 0x1000}, {}], 0x2, 0x0) semtimedop(r0, &(0x7f0000000000)=[{}, {0x0, 0x3, 0x1800}, {}], 0x3, &(0x7f0000000040)) 16:10:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000f00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:53 executing program 5: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000, 0x6}) 16:10:53 executing program 3: r0 = socket(0x11, 0x2, 0x0) msgget$private(0x0, 0x279) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @qipcrtr={0x2a, 0x4, 0x4001}, @rc={0x1f, @none, 0xfa}, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}) 16:10:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:53 executing program 0: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x100002, 0x0, 0x13, r0, 0x10000000) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x10000000) 16:10:53 executing program 5: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000, 0x6}) 16:10:53 executing program 1: r0 = semget$private(0x0, 0x2, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000000)=""/188) 16:10:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000001000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:53 executing program 3: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) 16:10:53 executing program 5: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000, 0x6}) 16:10:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:53 executing program 0: msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000002c0)=""/99) 16:10:54 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0xa, &(0x7f0000000040)=0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) io_submit(r1, 0x2, &(0x7f00000003c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x7}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x3, 0x0, r2, 0x0, 0x0, 0x5}]) 16:10:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f00000000000000000100007feefbd6c00b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:54 executing program 3: clock_gettime(0x0, &(0x7f00000001c0)) getresuid(&(0x7f0000000480), &(0x7f00000004c0), 0x0) 16:10:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000001100000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:54 executing program 5: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x6}) 16:10:54 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc1}, &(0x7f0000000100)={0x0, "49f53481c79173678f9c20d6d98f07d5cfa75237c143bfaa580c53438ac01938cb4caf124312de99dd1d35174de013560dda1ba1dd9f9a9d8d721af41d73c2cd"}, 0x48, 0xfffffffffffffffd) syz_genetlink_get_family_id$nl80211(&(0x7f0000000640), 0xffffffffffffffff) keyctl$unlink(0x9, r0, r0) 16:10:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000001200000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:54 executing program 5: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}) 16:10:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000004d00)={{0x14}, [@NFT_MSG_NEWSETELEM={0x14, 0xc, 0x0}], {0x14}}, 0x3c}}, 0x0) recvmmsg(r0, &(0x7f0000002dc0)=[{{&(0x7f0000000180)=@nl, 0x80, 0x0}}], 0x1, 0x40000022, 0x0) 16:10:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000380)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0xa00}}, [@NFT_MSG_NEWOBJ={0x1c, 0x12, 0xa, 0x801, 0x0, 0x0, {}, @NFT_OBJECT_CT_TIMEOUT=@NFTA_OBJ_TYPE={0x8}}], {0x14}}, 0x44}}, 0x0) 16:10:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000001800000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:54 executing program 1: r0 = io_uring_setup(0x623, &(0x7f0000000000)) r1 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x7, &(0x7f0000000080)=r1, 0x1) 16:10:54 executing program 5: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x5}) 16:10:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f0000000000000000010000000000000fe100000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="a80100000301010100000000000000000a"], 0x1a8}}, 0x0) 16:10:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000001900000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:54 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) 16:10:54 executing program 5: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) io_uring_setup(0x513d, &(0x7f00000000c0)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}) 16:10:54 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f00000006c0)={0x14, 0x453, 0x0, 0x0, 0x0, "b2", ["", ""]}, 0x14}}, 0x0) 16:10:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000000007fffffff00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000001f00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:54 executing program 5: io_uring_setup(0x421, &(0x7f0000000080)) [ 1379.888453][ T1262] netlink: 404 bytes leftover after parsing attributes in process `syz-executor.0'. 16:10:54 executing program 1: r0 = fork() waitid(0x0, r0, 0x0, 0x0, 0x0) 16:10:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) r2 = epoll_create(0x3) io_submit(r1, 0x2, &(0x7f0000000380)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2, 0x0, r2, 0x0}]) 16:10:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000002000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) [ 1379.950909][ T24] audit: type=1107 audit(1628352654.320:352): pid=1267 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='²' 16:10:54 executing program 0: sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, 0x0, 0x550e0e7edee6ec16) 16:10:54 executing program 1: r0 = getpid() tgkill(r0, r0, 0xfffffffe) 16:10:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000300000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:54 executing program 5: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x5, 0x0, 0x0, 0x0, 0xfd}) 16:10:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000102000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000002200000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:54 executing program 5: mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 16:10:54 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="a8010000030101"], 0x1a8}}, 0x0) 16:10:54 executing program 3: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x12, r0, 0x0) syz_io_uring_submit(r1, 0x0, 0x0, 0x0) 16:10:54 executing program 0: r0 = semget$private(0x0, 0x6, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x4}, {}], 0x2, &(0x7f0000000040)) 16:10:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000005f2400000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:54 executing program 5: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x100000, 0x4, 0x13, r0, 0x10000000) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x10000000) 16:10:54 executing program 0: socketpair(0x2, 0x802, 0x0, &(0x7f0000000180)) 16:10:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000002500000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 1380.179620][ T1307] netlink: 404 bytes leftover after parsing attributes in process `syz-executor.1'. 16:10:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:54 executing program 3: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890c, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000, 0x6}) 16:10:54 executing program 1: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0xa, 0x0, 0x0) 16:10:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000700000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:54 executing program 5: syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x100100) 16:10:54 executing program 0: io_uring_setup(0x15ee, &(0x7f00000001c0)={0x0, 0x0, 0x2}) io_uring_setup(0x7eca, &(0x7f0000000240)) 16:10:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000002e00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:54 executing program 3: migrate_pages(0x0, 0x9, &(0x7f0000000000)=0xfffffffffffffc01, &(0x7f0000000040)=0x1) 16:10:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:54 executing program 1: capget(&(0x7f0000000780)={0x20071026}, 0x0) 16:10:54 executing program 5: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @empty}, @l2tp={0x2, 0x0, @broadcast}, @can, 0x5}) 16:10:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000003f00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:54 executing program 3: getresuid(&(0x7f00000001c0), 0x0, 0x0) 16:10:54 executing program 0: r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, 0x0) 16:10:54 executing program 1: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0x8, 0x0, 0x0) 16:10:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:54 executing program 5: add_key$keyring(&(0x7f0000000340), 0x0, 0x0, 0x0, 0xfffffffffffffff8) 16:10:54 executing program 3: migrate_pages(0x0, 0x7, 0x0, &(0x7f0000000040)=0x101) 16:10:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000004000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:54 executing program 0: io_uring_setup(0x1b33, &(0x7f0000000000)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{}]}) 16:10:54 executing program 1: setresgid(0xffffffffffffffff, 0xee00, 0xee00) 16:10:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:54 executing program 5: openat$vcsu(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) 16:10:54 executing program 0: semget(0x3, 0x0, 0x4d4) 16:10:54 executing program 3: syz_mount_image$tmpfs(&(0x7f0000004400), &(0x7f0000004440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000056c0)) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000033c0)=[{&(0x7f0000000100)="ee49d4d61c34e8974dd51216a9f76f29a4f4eb1208e2f8826cf7803b59be0aa9bb7b0f6aa4f3a95414b6cd1c660c27dc7657d4e8da4cd36e633464e3715d3e56317d8d9a34ccb6abe00f40136975de7b52d6554b6f", 0x55, 0x8}, {&(0x7f00000001c0), 0x0, 0xfffffffffffffe01}], 0x80000, &(0x7f0000003480)={[{@mode={'mode', 0x3d, 0x1}}, {@nr_blocks={'nr_blocks', 0x3d, [0x31]}}], [{@hash}, {@audit}, {@obj_user={'obj_user', 0x3d, 'size'}}, {@pcr={'pcr', 0x3d, 0x27}}, {@euid_gt={'euid>', 0xee01}}]}) 16:10:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000004800000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:54 executing program 1: syz_mount_image$tmpfs(&(0x7f0000004400), &(0x7f0000004440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000056c0)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000080)='1', 0x1, 0x7}], 0x40000, &(0x7f0000000200)={[], [{@uid_gt={'uid>', 0xffffffffffffffff}}]}) 16:10:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000100000000000000000000000a001c000000060a0300000000000000000000000003080009400000000344"], 0xcc}}, 0x0) 16:10:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:55 executing program 0: syz_mount_image$tmpfs(&(0x7f0000004400), &(0x7f0000004440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/input/event#\x00'}}]}) 16:10:55 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000340), r0) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 16:10:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000004c00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:55 executing program 1: sched_setscheduler(0x0, 0x0, &(0x7f0000000140)=0x4) 16:10:55 executing program 5: r0 = socket(0x11, 0xa, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f0000000200)={0x0}}, 0x0) 16:10:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000006000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:55 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x34, 0x0, 0x0, 0x2}]}) 16:10:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:55 executing program 5: prctl$PR_SET_SECUREBITS(0x1c, 0x0) sendmsg$NL802154_CMD_SET_LBT_MODE(0xffffffffffffffff, 0x0, 0x0) [ 1380.717225][ T1390] tmpfs: Unknown parameter 'smackfstransmute' [ 1380.734414][ T1390] tmpfs: Unknown parameter 'smackfstransmute' 16:10:55 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0), r0) sendmsg$NBD_CMD_STATUS(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r2, 0x1, 0x0, 0x0, {0x2}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x1c}}, 0x0) 16:10:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg$sock(r0, &(0x7f0000002380)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}, {&(0x7f0000000280)="df", 0x1}], 0x2}}], 0x1, 0x0) 16:10:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000006800000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0xa, &(0x7f0000000040)=0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) io_submit(r1, 0x2, &(0x7f00000003c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x8, r2, 0x0, 0x0, 0x0, 0x0, 0x2}]) 16:10:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:55 executing program 1: setgid(0xee00) syz_open_procfs$userns(0x0, &(0x7f0000000000)) 16:10:55 executing program 5: r0 = socket(0x10, 0x2, 0x0) recvfrom(r0, 0x0, 0x0, 0x7, 0x0, 0x0) 16:10:55 executing program 0: mmap$IORING_OFF_SQES(&(0x7f0000ff7000/0x9000)=nil, 0x9000, 0x0, 0x104033, 0xffffffffffffffff, 0x10000000) 16:10:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000006c00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000f00000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:55 executing program 1: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x1}, &(0x7f00000000c0), 0x0) 16:10:55 executing program 5: syz_mount_image$tmpfs(&(0x7f0000004400), &(0x7f0000004440)='./file0\x00', 0x0, 0x0, 0x0, 0xc0ed0000, &(0x7f00000056c0)) 16:10:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000007400000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10}, 0x10}}, 0x0) 16:10:55 executing program 0: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x100000, 0x0, 0x13, r0, 0x10000000) 16:10:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:55 executing program 1: r0 = semget(0x0, 0x0, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0xee00}}) 16:10:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000007a00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:55 executing program 5: getrlimit(0x0, &(0x7f0000000040)) 16:10:55 executing program 0: clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, r0+60000000}, 0x0) 16:10:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000100000000000000000000000a001c000000060a03"], 0xcc}}, 0x0) 16:10:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:55 executing program 1: r0 = semget$private(0x0, 0x2, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000100)={{0x3, 0x0, 0xffffffffffffffff, 0x0, 0xee01}}) 16:10:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00ffffff8500000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[], 0x1a8}, 0xb}, 0x0) 16:10:55 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x2, 0x1000}, {}], 0x2) 16:10:55 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000025c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000002580)={&(0x7f0000002600)={0x1ec4, 0x0, 0x0, 0x0, 0x0, {}, [@nested={0x1ead, 0x0, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@mcast1}, @typed={0x8, 0x0, 0x0, 0x0, @u32}, @generic="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", @generic="d43248455b5cb75533763c4028f05700b8fd045287a492", @generic="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"]}]}, 0x1ec4}}, 0x0) 16:10:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001001200000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000040)={0x0, 0x0, 0xfffffffffffffffd}, 0x0) 16:10:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000004d00)={{0x3c}, [@NFT_MSG_NEWSETELEM={0xf}], {0x14}}, 0x3c}}, 0x0) 16:10:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00ffffff8c00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 1381.212869][ T1472] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 16:10:56 executing program 0: r0 = semget$private(0x0, 0x6, 0x0) semtimedop(r0, &(0x7f0000000000)=[{}, {0x0, 0x3}, {}], 0x3, &(0x7f0000000040)) 16:10:56 executing program 5: pipe2$9p(0x0, 0xc0800) 16:10:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000a9000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:56 executing program 1: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r0, r1) 16:10:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:56 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r0, 0x0, 0x0, 0x20000120, 0x0, 0x0) 16:10:56 executing program 1: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x2, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000, 0x6}) 16:10:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001002e00000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:56 executing program 5: io_uring_setup(0x38d9, &(0x7f0000000040)={0x0, 0x2000000, 0x8}) 16:10:56 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 16:10:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000003b800000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:56 executing program 1: r0 = getpid() ptrace(0x8, r0) 16:10:56 executing program 5: socketpair(0x11, 0xa, 0x41aa, &(0x7f0000000040)) 16:10:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000003ba00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_pgetevents(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 16:10:56 executing program 1: syz_mount_image$tmpfs(&(0x7f0000004400), &(0x7f0000004440)='./file0\x00', 0x0, 0x0, 0x0, 0x45, &(0x7f00000056c0)) 16:10:57 executing program 3: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x5421, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @local}, @can}) 16:10:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000003bb00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x38, 0x1, 0x2, 0x201, 0x0, 0x0, {0x2}, [@CTA_EXPECT_MASTER={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private}, {0x8, 0x2, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}]}]}, 0x38}}, 0x0) 16:10:57 executing program 5: add_key$fscrypt_v1(&(0x7f0000000080), 0x0, &(0x7f0000000100)={0x0, "49f53481c79173678f9c20d6d98f07d5cfa75237c143bfaa580c53438ac01938cb4caf124312de99dd1d35174de013560dda1ba1dd9f9a9d8d721af41d73c2cd"}, 0x48, 0xfffffffffffffffd) 16:10:57 executing program 0: syz_open_dev$rtc(&(0x7f0000000000), 0x4, 0x8200) 16:10:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000003bc00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:57 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340), r0) 16:10:57 executing program 5: prctl$PR_SET_SECUREBITS(0x1c, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), r0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000001c0)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x74, r2, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_ACKREQ_DEFAULT={0x5}, @NL802154_ATTR_ACKREQ_DEFAULT={0x5, 0x1a, 0x1}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_ACKREQ_DEFAULT={0x5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x74}, 0x1, 0x0, 0x0, 0x48000}, 0x40000801) syz_genetlink_get_family_id$nl802154(&(0x7f0000000340), r0) sendmsg$NL802154_CMD_SET_LBT_MODE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, 0x0, 0x400, 0x70bd2c, 0x25dfdbfd}, 0x14}}, 0x8) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 16:10:57 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$search(0xa, r0, &(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x0}, r1) 16:10:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001006000000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:57 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) r1 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x5c, r1, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_ACKREQ_DEFAULT={0x5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x5c}}, 0x0) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) 16:10:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001006800000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000003bd00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x38, 0x1, 0x2, 0x201, 0x0, 0x0, {0x2}, [@CTA_EXPECT_MASTER={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private}, {0x8, 0x2, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x38}}, 0x0) 16:10:57 executing program 1: r0 = semget$private(0x0, 0x6, 0x0) semtimedop(r0, &(0x7f0000000140)=[{}], 0x1, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)) 16:10:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000003be00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x14}], {0x14}}, 0x3c}}, 0x0) 16:10:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:57 executing program 0: clock_gettime(0x0, &(0x7f0000000140)={0x0}) pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0)={0x7}, &(0x7f0000000100), &(0x7f0000000180)={r0}, 0x0) 16:10:57 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x5411, &(0x7f0000000040)={'vcan0\x00'}) 16:10:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000003bf00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:57 executing program 1: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000000c0)="c1e3e608d44a4c710de19d10f2d3a568fa73f7be5cd5e08d2af57e7041354c8856b6406eafbc1ad19d086985e5afffb9999c43f96f7dc9193f67e9bf751e4a3a894d1d7f9ed3ade3", 0x48, 0x8, 0x0, 0x1}, &(0x7f0000000140)) 16:10:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x3, 0x0, 0x0, 0x93}]}) [ 1383.208628][ T1564] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=1564 comm=syz-executor.3 [ 1383.221451][ T1564] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=1564 comm=syz-executor.3 16:10:57 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003480)={[{@mode}]}) 16:10:57 executing program 3: prctl$PR_SET_SECUREBITS(0x1c, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0}, 0x20000000) syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), r0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000340), r0) sendmsg$NL802154_CMD_SET_LBT_MODE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, r1, 0x400}, 0x14}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 16:10:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001007a00000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:57 executing program 1: add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc1}, &(0x7f0000000100)={0x0, "49f53481c79173678f9c20d6d98f07d5cfa75237c143bfaa580c53438ac01938cb4caf124312de99dd1d35174de013560dda1ba1dd9f9a9d8d721af41d73c2cd"}, 0x48, 0xfffffffffffffffd) 16:10:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000003c000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:57 executing program 0: io_uring_setup(0x6d56, &(0x7f0000000040)={0x0, 0x0, 0x16}) 16:10:57 executing program 5: mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, 0x0) 16:10:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:57 executing program 1: process_vm_writev(0x0, &(0x7f0000000280)=[{&(0x7f0000000080)=""/229, 0xe5}], 0x1, &(0x7f0000000480)=[{&(0x7f0000000500)=""/102400, 0x19000}], 0x1, 0x0) 16:10:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000edc000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:57 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0), r0) sendmsg$NBD_CMD_STATUS(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x28, r2, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_INDEX={0xb, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8}]}]}, 0x28}}, 0x0) 16:10:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:57 executing program 0: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x20953, r0, 0x10000000) 16:10:57 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_ASSOCIATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYRES16], 0x38}}, 0x0) 16:10:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000003c100000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:57 executing program 1: semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000000)=""/20) 16:10:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:57 executing program 0: syz_mount_image$tmpfs(&(0x7f0000004400), &(0x7f0000004440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000056c0)) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000033c0)=[{&(0x7f0000000100)="ee", 0x1}, {&(0x7f00000001c0)="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", 0x200, 0xfffffffffffffe01}, {&(0x7f00000011c0)="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", 0xc02, 0x3ff}], 0x80000, &(0x7f0000003480)={[], [{@hash}]}) 16:10:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000040)={0x44, 0x1, 0x2, 0x201, 0x0, 0x0, {0x2}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}]}]}, 0x44}}, 0x0) 16:10:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x1c, 0x0, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x4}, @CTA_EXPECT_MASK={0x4}]}, 0x1c}}, 0x0) 16:10:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="a8010000020101"], 0x1a8}}, 0x0) 16:10:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00ffffffda00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:58 executing program 1: syz_open_dev$evdev(&(0x7f0000003140), 0xfffffffffffffff8, 0x0) 16:10:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="a8010000000101010000000000000000020000009c0002800c000280050001003a00000014000180080001"], 0x1a8}}, 0x0) 16:10:58 executing program 5: get_robust_list(0x0, &(0x7f00000001c0)=0x0, &(0x7f0000000200)) 16:10:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00ffffffe200000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:58 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000001c0)) [ 1383.657974][ T1652] netlink: 404 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1383.665809][ T1657] netlink: 248 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1383.696447][ T1657] netlink: 120 bytes leftover after parsing attributes in process `syz-executor.3'. 16:10:58 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) io_uring_setup(0x363a, &(0x7f00000002c0)={0x0, 0x0, 0x23, 0x0, 0x0, 0x0, r0}) 16:10:58 executing program 5: semop(0x0, &(0x7f0000000100)=[{0x0, 0x2}], 0x1) [ 1383.706176][ T1657] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1383.715673][ T1657] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 16:10:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00fffffff000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:58 executing program 3: r0 = getpid() ptrace(0x4206, r0) 16:10:58 executing program 1: getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000300)) 16:10:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000000)={"e518a581f54867783a652745eba35b01"}) 16:10:58 executing program 5: io_uring_setup(0x6c50, &(0x7f00000001c0)) 16:10:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000003f200000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000004d00)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0xb}}, [], {0x14}}, 0x28}}, 0x0) 16:10:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_ASSOCIATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) 16:10:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:58 executing program 0: r0 = io_uring_setup(0x6809, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) 16:10:58 executing program 5: syz_mount_image$tmpfs(&(0x7f0000004400), &(0x7f0000004440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000056c0)={[{@gid={'gid', 0x3d, 0xee01}}, {@size={'size', 0x3d, [0x32, 0x0]}}]}) 16:10:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket(0x2, 0x803, 0xff) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) r2 = dup(r1) sendfile(r2, r0, 0x0, 0x4000000000000081) r3 = openat(0xffffffffffffffff, &(0x7f0000000200)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 16:10:58 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) 16:10:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000003f300000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:58 executing program 0: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x8901, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @local}, @can}) 16:10:58 executing program 1: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x100002, 0x0, 0x13, r0, 0x10000000) 16:10:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:58 executing program 5: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x10000000) 16:10:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000003f400000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:58 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/ipc\x00') 16:10:58 executing program 1: setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0xfffffdaa) 16:10:58 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x4008007) 16:10:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000003f500000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:58 executing program 0: semctl$GETZCNT(0x0, 0x0, 0x10, 0x0) 16:10:58 executing program 5: r0 = semget$private(0x0, 0x6, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x0, 0x0, 0x1000}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x4}, {0x0, 0x3, 0x1800}], 0x2, 0x0) 16:10:58 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0xfe9a) 16:10:58 executing program 3: syz_open_dev$vcsa(&(0x7f0000000080), 0x36, 0x201) 16:10:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:58 executing program 5: syz_mount_image$tmpfs(&(0x7f0000004400), &(0x7f0000004440)='./file0\x00', 0x0, 0x0, 0x0, 0x2, &(0x7f00000056c0)) 16:10:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5, 0x0, 0x0, {0x1}}], {0x14}}, 0x3c}}, 0x0) 16:10:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000003f600000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:58 executing program 3: clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) clock_nanosleep(0x0, 0x0, &(0x7f0000000440)={0x0, r0+60000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000004400), &(0x7f0000004440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000056c0)=ANY=[]) 16:10:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, 0x1, 0x4, 0x301, 0x0, 0x0, {}, [@NFULA_CFG_NLBUFSIZ={0x8}, @NFULA_CFG_TIMEOUT={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x2c}}, 0x0) 16:10:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f00000000000000000100000a000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:58 executing program 5: r0 = semget$private(0x0, 0x6, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x4, 0x5}, {}], 0x2, 0x0) 16:10:58 executing program 1: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x541b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @local}, @can}) 16:10:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00fffffff600000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_DELTABLE={0x2c, 0x2, 0xa, 0x801, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_HANDLE={0xc}]}, @NFT_MSG_DELCHAIN={0x20, 0x5, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x74}}, 0x0) 16:10:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="a80100000001010100000000000000000a0000009c0002800c000280050001003a00000014000180080001"], 0x1a8}}, 0x0) 16:10:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000003f700000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:58 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) [ 1384.398758][ T1796] netlink: 248 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1384.432769][ T1796] netlink: 120 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1384.445641][ T1796] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1384.455643][ T1796] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 16:10:59 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x16}]}) 16:10:59 executing program 0: syz_mount_image$tmpfs(&(0x7f0000004400), &(0x7f0000004440)='./file0\x00', 0x0, 0x0, 0x0, 0x1020, &(0x7f00000056c0)) 16:10:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00fffffdf900000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:59 executing program 1: r0 = semget$private(0x0, 0x6, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x0, 0x100}, {}], 0x2, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1800}], 0x1, 0x0) 16:10:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:59 executing program 5: msgget(0x0, 0x284) 16:10:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:10:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00fffffffb00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:59 executing program 0: syz_open_dev$evdev(&(0x7f0000001d80), 0x0, 0x410b01) [ 1385.063919][ T24] audit: type=1326 audit(1628352659.441:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1809 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 16:10:59 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x19, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x16}]}) 16:10:59 executing program 5: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x10000000) fork() 16:10:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00fffffdfd00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:10:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f00000000000000000100000f000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) [ 1385.128777][ T24] audit: type=1326 audit(1628352659.491:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1809 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=3 compat=0 ip=0x4193fb code=0x0 16:10:59 executing program 0: pipe(&(0x7f0000000200)) 16:10:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00fffffffe00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 1385.185247][ T24] audit: type=1326 audit(1628352659.561:355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1823 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 [ 1385.239665][ T24] audit: type=1326 audit(1628352659.611:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1823 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=3 compat=0 ip=0x4193fb code=0x0 16:11:00 executing program 1: syz_mount_image$tmpfs(&(0x7f0000004400), &(0x7f0000004440)='./file0\x00', 0x0, 0x0, 0x0, 0xa00, &(0x7f00000056c0)) 16:11:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:00 executing program 3: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x5, 0x0, 0x0, 0x0, 0x1004, 0x0, 0x0, 0x100000000, 0x6}) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='syzkaller0\x00'}) 16:11:00 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000180), r0) 16:11:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000fff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:00 executing program 0: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$link(0x8, r0, 0xfffffffffffffffe) 16:11:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00fffffbff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:00 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc1}, &(0x7f0000000100)={0x0, "49f53481c79173678f9c20d6d98f07d5cfa75237c143bfaa580c53438ac01938cb4caf124312de99dd1d35174de013560dda1ba1dd9f9a9d8d721af41d73c2cd"}, 0x48, 0xfffffffffffffffd) keyctl$unlink(0x9, 0x0, r0) 16:11:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000001680)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000010"], 0x3c}}, 0x0) 16:11:00 executing program 3: syz_mount_image$tmpfs(&(0x7f0000004400), &(0x7f0000004440)='./file0\x00', 0x0, 0x0, 0x0, 0x5, &(0x7f00000056c0)) 16:11:00 executing program 1: msgget(0x3, 0x732) 16:11:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_timeval(r0, 0x1, 0x14, 0x0, &(0x7f0000000040)) 16:11:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000003ffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:00 executing program 1: syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x80400) 16:11:00 executing program 3: syz_mount_image$tmpfs(&(0x7f0000004400), &(0x7f0000004440)='./file0\x00', 0x0, 0x0, 0x0, 0x54, &(0x7f00000056c0)) 16:11:00 executing program 0: ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x40800, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x0) fork() 16:11:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00001fffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:00 executing program 1: shmctl$SHM_STAT_ANY(0x0, 0xf, &(0x7f0000000180)=""/164) 16:11:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)={0x18, 0x0, 0x2, 0x201, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x4}]}, 0x18}}, 0x0) 16:11:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)={{0x14}, [@NFT_MSG_DELFLOWTABLE={0x2c, 0x18, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_HANDLE={0xc}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x54}}, 0x0) 16:11:00 executing program 3: clock_gettime(0x0, &(0x7f0000000140)={0x0}) pselect6(0x40, &(0x7f0000000080)={0x5}, 0x0, &(0x7f0000000100)={0x2}, &(0x7f0000000180)={r0}, 0x0) 16:11:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000e0ffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:00 executing program 1: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000700)={{0x2, 0x0, 0x0, 0x0, 0xee00}}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) 16:11:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x4, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000002340), 0x0, 0x0) dup2(r1, r0) 16:11:00 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002b40)={&(0x7f00000013c0), 0xc, &(0x7f0000002b00)={&(0x7f00000027c0)=@getpolicy={0x98, 0x15, 0x1, 0x0, 0x0, {{@in=@empty}, 0x6e6bb3}, [@algo_auth={0x48, 0x1, {{'blake2s-160\x00'}}}]}, 0x98}}, 0x0) 16:11:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0007eeffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:00 executing program 1: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x8916, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @local}, @can}) 16:11:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:00 executing program 5: r0 = io_uring_setup(0xc63, &(0x7f0000000300)={0x0, 0x9c6f}) io_uring_register$IORING_REGISTER_PROBE(r0, 0x8, &(0x7f0000000380)={0x0, 0x0, 0x0, '\x00', [{}, {}]}, 0x2) 16:11:00 executing program 0: keyctl$search(0xa, 0x0, &(0x7f0000000100)='user\x00', 0x0, 0x0) 16:11:00 executing program 3: capget(&(0x7f0000000780), 0x0) 16:11:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00fffbffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x201, 0x0, 0x0, {0xb}}], {0x14}}, 0x3c}}, 0x0) 16:11:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:00 executing program 5: add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) 16:11:00 executing program 0: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @empty}, @can, 0x5}) 16:11:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:00 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000004440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280), &(0x7f00000022c0)=@v3={0x3000000, [], 0xffffffffffffffff}, 0x18, 0x0) 16:11:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00f9fdffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000001b40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="100000000000000001"], 0x10}}], 0x1, 0x0) 16:11:00 executing program 1: r0 = semget$private(0x0, 0x6, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x0, 0x0, 0x1000}, {}], 0x2, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x800}, {0x0, 0x3, 0x1800}, {}], 0x3, &(0x7f0000000040)) 16:11:00 executing program 5: r0 = semget$private(0x0, 0x6, 0x0) semtimedop(r0, &(0x7f0000000140)=[{}], 0x1, &(0x7f0000000180)={0x77359400}) 16:11:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001001728000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:00 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x20001) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90891e45be08c4a81a1fa7357d24dae6495b9af85847ec2012c0abc52c70ce230cb58017a42655b466402196bee2c1c4b50a5567408aeaef76cb0040bbb3a6b4", "d17c50b1badbe785dce7b9817e5bfa135086900189e0d31d2379365feffd25d2cca9695d08d127407d077958dc293511c963aaf2075c0b925f41407a2ae5cce9", "7fa9bb50676b31de20ac9b0d294eba31454062a4b8900f0740d52e4b43d70bf0"}) 16:11:00 executing program 0: socketpair(0x2, 0x0, 0x401, &(0x7f0000000000)) 16:11:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00fdfdffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, 0x1, 0x4, 0x301, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x2}]}, 0x1c}}, 0x0) 16:11:00 executing program 5: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0xc, 0x0, 0x0) 16:11:01 executing program 3: keyctl$get_persistent(0x16, 0x0, 0xfffffffffffffffa) 16:11:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f00000000000000000100003f000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f007fffffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:01 executing program 0: r0 = io_uring_setup(0x5351, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x7, &(0x7f0000000540), 0x1) 16:11:01 executing program 1: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @remote}, @l2tp={0x2, 0x0, @local}, @can, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x6}) 16:11:01 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 16:11:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0085ffffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:01 executing program 3: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890c, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x5}) 16:11:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:01 executing program 0: r0 = io_uring_setup(0x2ac3, &(0x7f0000000000)={0x0, 0xf395}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) 16:11:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f008cffffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:01 executing program 1: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) r1 = fcntl$dupfd(r0, 0x0, r0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) 16:11:01 executing program 3: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890c, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x5}) 16:11:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0xa, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000340)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7, 0x0, r0, &(0x7f0000000080)="d92d45f41a7a169e37", 0x9}]) 16:11:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:01 executing program 0: timer_create(0x0, &(0x7f0000000200)={0x0, 0x0, 0x4, @thr={0x0, 0x0}}, 0x0) 16:11:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00daffffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:01 executing program 3: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890c, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x5}) 16:11:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f00000000000000000100004c000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00e2ffffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:01 executing program 1: syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x201) 16:11:01 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000000240)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) 16:11:01 executing program 5: select(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0xdb2e}, &(0x7f00000000c0)={0x0, 0xea60}) 16:11:01 executing program 3: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890c, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @local}, @can, 0x5}) 16:11:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00f0ffffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:01 executing program 1: keyctl$restrict_keyring(0x1d, 0xfffffffffffffffb, &(0x7f0000000100)='.dead\x00', &(0x7f0000000140)='#^/\x00') 16:11:01 executing program 5: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000700)={{0x2, 0x0, 0x0, 0x0, 0xee00}}) 16:11:01 executing program 3: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000003, 0x13, r0, 0x10000000) 16:11:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00f6ffffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:01 executing program 1: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x8902, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @local}, @can}) 16:11:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) r2 = epoll_create(0x3) io_submit(r1, 0x2, &(0x7f0000000380)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}]) 16:11:01 executing program 0: r0 = socket(0x10, 0x3, 0x2) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) 16:11:01 executing program 3: io_uring_setup(0x5c13, &(0x7f0000000180)={0x0, 0x0, 0x8}) 16:11:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00fbffffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:01 executing program 1: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0xa, 0x0, 0x0) 16:11:01 executing program 5: socket(0x0, 0x0, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) openat$ptmx(0xffffffffffffff9c, &(0x7f00000020c0), 0x6a42, 0x0) 16:11:01 executing program 3: clock_gettime(0x0, &(0x7f0000000140)) pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x2}, 0x0, 0x0) 16:11:01 executing program 0: syz_open_dev$vcsa(&(0x7f00000000c0), 0x0, 0x101140) 16:11:01 executing program 1: r0 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$link(0x8, 0x0, r0) 16:11:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00feffffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x40, 0x1, 0x2, 0x201, 0x0, 0x0, {0x2}, [@CTA_EXPECT_ZONE={0x6}, @CTA_EXPECT_MASTER={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private}, {0x8, 0x2, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x40}}, 0x0) 16:11:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:01 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "688463ee0ee4ae00fdd69d0c54fb148f9a4b41"}) 16:11:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000002000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:01 executing program 5: semctl$GETPID(0xffffffffffffffff, 0x0, 0xb, 0x0) syz_io_uring_setup(0x757f, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, 0x1dd}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) 16:11:01 executing program 0: syz_io_uring_setup(0x0, &(0x7f0000002940), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_io_uring_setup(0x5ff8, &(0x7f0000000100), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000002000/0x1000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 16:11:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:02 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f00000004c0)="d5eda4c774bb233b8feb65b0905a8210", 0x10) 16:11:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x2c, 0x16, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}], {0x14}}, 0x54}}, 0x0) 16:11:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000003000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:02 executing program 5: syz_io_uring_setup(0x24b9, &(0x7f0000000000)={0x0, 0x0, 0x40}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 16:11:02 executing program 0: ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[], 0x2bcf) r1 = gettid() perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x2, 0x6b, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x0, @perf_config_ext={0x99c0, 0xff}, 0x0, 0x7e2f, 0x8001, 0x5, 0x0, 0x0, 0x0, 0x0, 0xd0}, r1, 0x0, 0xffffffffffffffff, 0x2) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x2548}], 0xf, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='illinois\x00', 0x9) 16:11:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f00000000000000000100fffe000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:02 executing program 3: io_setup(0x10001, &(0x7f00000000c0)) 16:11:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000203000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:02 executing program 5: select(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x2000000000000000}, 0x0, 0x0) 16:11:02 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000001980)='./file0\x00', 0x208c0, 0x0) 16:11:02 executing program 0: openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000280)='cgroup.clone_children\x00', 0x2, 0x0) 16:11:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000004000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:02 executing program 5: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x8914, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @local}, @can}) 16:11:02 executing program 1: r0 = semget$private(0x0, 0x6, 0x0) semctl$SETALL(r0, 0x0, 0x11, 0x0) 16:11:02 executing program 3: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x0, &(0x7f00000000c0), 0x0, 0x4) 16:11:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000005000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:02 executing program 0: r0 = semget$private(0x0, 0x1, 0x0) semctl$GETZCNT(r0, 0x1, 0xf, 0x0) 16:11:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:02 executing program 1: io_setup(0x7, &(0x7f0000000000)=0x0) io_setup(0xa, &(0x7f0000000040)) io_setup(0x3, &(0x7f0000000080)) io_destroy(r0) 16:11:02 executing program 3: syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff) 16:11:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000040)=0xffffffffffffffff) 16:11:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:02 executing program 5: getresuid(&(0x7f00000001c0), 0x0, 0x0) io_setup(0x10001, &(0x7f00000000c0)) 16:11:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000006000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:02 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000001340), 0x0, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x134b) 16:11:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:02 executing program 0: syz_mount_image$tmpfs(&(0x7f0000004400), &(0x7f0000004440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000056c0)) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000033c0)=[{&(0x7f0000000100)="ee49d4d61c34e8974dd51216a9f76f29a4f4eb1208e2f8826cf7803b59be0aa9bb7b0f6aa4f3a95414b6cd1c660c27dc7657d4e8da4cd36e633464e3715d3e56317d8d9a34ccb6abe00f40136975de7b52d6554b6f0862d113a59e2488901b2530cd3fce1a6f5b48c2d8d594d73361fde296ea628648efc107ab2f7074498a0c0d11c240e4278df8d478eab309ad1f8d26ac46c3b593b635ff30f23898bddce4caf75b846d21e173c5", 0xa9, 0x8}, {&(0x7f00000001c0)="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", 0x1f8, 0xfffffffffffffe01}, {&(0x7f00000011c0)="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", 0xc02, 0x3ff}], 0x80000, &(0x7f0000003480)={[{@mode={'mode', 0x3d, 0x1}}, {@nr_blocks={'nr_blocks', 0x3d, [0x31]}}], [{@hash}, {@audit}, {@obj_user={'obj_user', 0x3d, 'size'}}, {@pcr={'pcr', 0x3d, 0x27}}, {@euid_gt={'euid>', 0xee01}}]}) 16:11:02 executing program 5: ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) fork() 16:11:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000007000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:02 executing program 1: r0 = getpid() r1 = getpid() tgkill(r0, r1, 0x0) 16:11:02 executing program 3: mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0) 16:11:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000008000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:02 executing program 0: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000700)={{0x2, 0x0, 0x0, 0x0, 0xee00}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}) 16:11:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="a80100000001010100000000000000000a0000009c0002800c000280050001003a000000140001"], 0x1a8}}, 0x0) 16:11:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000000000a000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2c, 0x1, 0x4, 0x5, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_QTHRESH={0x8}, @NFULA_CFG_FLAGS={0x6}]}, 0x2c}}, 0x0) 16:11:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000004d00)={{0x14}, [@NFT_MSG_NEWSETELEM={0x14}], {0x14}}, 0x3c}}, 0x0) recvmmsg(r0, &(0x7f00000018c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=""/200, 0xc8}}], 0x1, 0x2000, &(0x7f0000001940)) 16:11:03 executing program 1: r0 = syz_open_dev$rtc(&(0x7f0000000380), 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f00000003c0)) [ 1388.603035][ T2163] netlink: 248 bytes leftover after parsing attributes in process `syz-executor.5'. 16:11:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x1c, 0x3, 0x1, 0x201, 0x0, 0x0, {}, [@CTA_MARK={0x8}]}, 0x1c}}, 0x0) [ 1388.644853][ T2163] netlink: 120 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1388.654493][ T2163] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1388.664016][ T2163] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 16:11:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000000000500000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000000000f000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:03 executing program 5: syz_mount_image$tmpfs(&(0x7f0000004400), &(0x7f0000004440)='./file0\x00', 0x0, 0x0, 0x0, 0xc00, &(0x7f00000056c0)) 16:11:03 executing program 0: ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x40800, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) 16:11:03 executing program 3: semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000300)=""/4096) 16:11:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="a80100000001010100000000000000000a0000009c0002"], 0x1a8}}, 0x0) 16:11:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x2c, 0x1, 0x2, 0x201, 0x0, 0x0, {0x2}, [@CTA_EXPECT_MASTER={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private}, {0x8, 0x2, @local}}}]}]}, 0x2c}}, 0x0) 16:11:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000014000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:03 executing program 0: semctl$SEM_STAT_ANY(0x0, 0x0, 0x14, &(0x7f0000000200)=""/66) 16:11:03 executing program 5: semget(0x3, 0x0, 0x728) 16:11:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00ffff888130c8d018000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:03 executing program 0: keyctl$search(0xa, 0x0, &(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0) [ 1388.838817][ T2197] netlink: 248 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1388.868188][ T2197] netlink: 152 bytes leftover after parsing attributes in process `syz-executor.1'. 16:11:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:03 executing program 5: r0 = semget$private(0x0, 0x6, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x0, 0x0, 0x1000}, {0x6}], 0x2, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x9]) 16:11:03 executing program 3: add_key$fscrypt_v1(&(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) 16:11:03 executing program 1: syz_io_uring_setup(0x1603, &(0x7f00000001c0), &(0x7f0000fee000/0x11000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000280)) 16:11:03 executing program 0: add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 16:11:03 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x77, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) 16:11:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000025000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:03 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000280), r0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000000400)={&(0x7f0000000240), 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0x64, r2, 0x9, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @private}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'bridge0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:ifconfig_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @private}]}, 0x64}}, 0x0) 16:11:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) io_getevents(r1, 0x8, 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 16:11:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000000000700000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000004d00)=ANY=[@ANYBLOB="1400000010"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000008b00)=[{{&(0x7f0000005d80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000061c0)=[{&(0x7f0000005e00)=""/100, 0x64}], 0x1}}], 0x1, 0x0, 0x0) 16:11:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x2c, 0x16, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x5, 0x0, 0x0, {0xc}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x74}}, 0x0) 16:11:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000000002e000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x48}}, 0x0) 16:11:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000005530000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:03 executing program 3: r0 = getpid() r1 = getpid() tgkill(r1, r0, 0x12) 16:11:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x1, 0x2, 0x0, 0x0, 0x0, {}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0xffffffff}, @CTA_EXPECT_CLASS={0x8}]}, 0x24}}, 0x0) 16:11:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000000000900000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:03 executing program 0: semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f00000001c0)=""/50) 16:11:04 executing program 1: syz_mount_image$tmpfs(&(0x7f0000004400), &(0x7f0000004440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000056c0)) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000033c0)=[{&(0x7f0000000100)="ee", 0x1}, {&(0x7f00000001c0)="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", 0x200, 0xfffffffffffffe01}, {&(0x7f00000011c0)="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", 0xc02, 0x3ff}], 0x80000, &(0x7f0000003480)={[{@mode}], [{@audit}]}) 16:11:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000031000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:04 executing program 0: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x4, 0x0, @local}, @can, 0x5}) 16:11:04 executing program 3: r0 = semget$private(0x0, 0x6, 0x0) semtimedop(r0, &(0x7f0000000000)=[{}, {0x0, 0x3, 0x1800}, {}], 0x3, &(0x7f0000000040)) 16:11:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x1, 0x2, 0x0, 0x0, 0x0, {}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0xffffffff}, @CTA_EXPECT_CLASS={0x8}]}, 0x24}}, 0x0) 16:11:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_ASSOCIATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x38}}, 0x0) 16:11:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000005531000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x1, 0x2, 0x0, 0x0, 0x0, {}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0xffffffff}, @CTA_EXPECT_CLASS={0x8}]}, 0x24}}, 0x0) 16:11:04 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) read$char_usb(r0, 0x0, 0x0) 16:11:04 executing program 1: syz_io_uring_setup(0x4cc1, &(0x7f0000000000), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000000080)) 16:11:04 executing program 3: r0 = semget$private(0x0, 0x4, 0x0) semctl$SEM_STAT_ANY(r0, 0x0, 0x14, &(0x7f0000000200)=""/66) 16:11:04 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000740)={0x10}, 0x10}}, 0x0) 16:11:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x1, 0x2, 0x0, 0x0, 0x0, {}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0xffffffff}, @CTA_EXPECT_CLASS={0x8}]}, 0x24}}, 0x0) 16:11:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000005532000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:04 executing program 3: socketpair(0x0, 0x80406, 0x0, 0x0) 16:11:04 executing program 0: io_uring_setup(0x6204, &(0x7f00000000c0)={0x0, 0x0, 0x4}) 16:11:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:04 executing program 1: r0 = msgget$private(0x0, 0x11a) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000080)=""/91) 16:11:04 executing program 5: sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x1, 0x2, 0x0, 0x0, 0x0, {}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0xffffffff}, @CTA_EXPECT_CLASS={0x8}]}, 0x24}}, 0x0) 16:11:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000005533000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:04 executing program 3: socketpair(0x10, 0x3, 0x0, &(0x7f0000002f00)) 16:11:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000005534000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:04 executing program 1: pselect6(0x40, &(0x7f0000000080)={0x5}, 0x0, 0x0, 0x0, 0x0) 16:11:04 executing program 0: r0 = semget(0x2, 0x3, 0x6e0) semget$private(0x0, 0x1, 0x80) semctl$GETZCNT(r0, 0x1, 0xf, 0x0) r1 = semget(0x0, 0x3, 0x0) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f00000000c0)=""/188) semctl$SEM_STAT_ANY(0x0, 0x3, 0x14, &(0x7f0000000000)=""/184) 16:11:04 executing program 5: sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x1, 0x2, 0x0, 0x0, 0x0, {}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0xffffffff}, @CTA_EXPECT_CLASS={0x8}]}, 0x24}}, 0x0) 16:11:04 executing program 3: keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000140)=""/44, 0x2c) 16:11:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000005535000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:04 executing program 1: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0x6, 0x0, 0x0) 16:11:04 executing program 5: sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x1, 0x2, 0x0, 0x0, 0x0, {}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0xffffffff}, @CTA_EXPECT_CLASS={0x8}]}, 0x24}}, 0x0) 16:11:04 executing program 3: r0 = io_uring_setup(0x276c, &(0x7f0000000040)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = io_uring_setup(0x276c, &(0x7f0000000040)) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x100002, 0x0, 0x13, r1, 0x10000000) 16:11:04 executing program 0: syz_mount_image$tmpfs(&(0x7f0000004400), &(0x7f0000004440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000056c0)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000080)='1', 0x1}], 0x40000, &(0x7f0000000200)) 16:11:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000005536000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x1, 0x2, 0x0, 0x0, 0x0, {}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0xffffffff}, @CTA_EXPECT_CLASS={0x8}]}, 0x24}}, 0x0) 16:11:04 executing program 1: r0 = io_uring_setup(0x5c13, &(0x7f0000000180)={0x0, 0x8d09}) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0xa, 0x0, 0x0) 16:11:04 executing program 3: add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000100)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "9c41c626a4e46f080ebd7ca75790a054856f2c71e4eb49b1005ba5a08544208fd9f050b7aab5ad336d88ddf172eedcfc178868c394001679d77858dfbefb909d"}, 0x48, 0xfffffffffffffffe) 16:11:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) r2 = epoll_create(0x3) io_submit(r1, 0x2, &(0x7f0000000380)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f00000000c0)={0x0, 0x0, 0xfe, 0x0, 0x0, r2, 0x0}]) 16:11:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000005537000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:05 executing program 3: add_key$keyring(&(0x7f0000001080), &(0x7f00000010c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) 16:11:05 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt(r0, 0x1, 0x0, &(0x7f0000000000)='\n\'', 0xffffffffffffffff}}, {@subj_role={'subj_role', 0x3d, '/sys/fs/smackfs/mapped\x00'}}]}) 16:11:05 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000004440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$incfs_metadata(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000180)="e51275da03e9ac8110824c94bac4a953bcabb262b35a2a41b6aabbbf88", 0x1d, 0x0) 16:11:05 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000340), r0) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000005c0)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x1c}}, 0x0) 16:11:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000000553a000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:05 executing program 1: add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000100)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "9c41c626a4e46f080ebd7ca75790a054856f2c71e4eb49b1005ba5a08544208fd9f050b7aab5ad336d88ddf172eedcfc178868c394001679d77858dfbefb909d"}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "c75fb8638d7c1a59f011e06c9486246f980ae3e420b177b16463892c54980986b4d8d7a7180c6cd124acae57d77ce7a1da2ee036f4bbedd7b60a0833676e5553"}, 0x48, 0xfffffffffffffffe) [ 1390.724492][ T2363] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=513 sclass=netlink_route_socket pid=2363 comm=syz-executor.5 16:11:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000000102000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:05 executing program 0: io_uring_setup(0x3b0f, &(0x7f00000002c0)) r0 = io_uring_setup(0x38d9, &(0x7f0000000040)={0x0, 0x0, 0x1}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) 16:11:05 executing program 1: syz_open_dev$vcsa(&(0x7f0000000080), 0x36, 0x0) 16:11:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x1, 0x2, 0x0, 0x0, 0x0, {}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0xffffffff}, @CTA_EXPECT_CLASS={0x8}]}, 0x24}}, 0x0) 16:11:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000000553b000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:05 executing program 1: r0 = semget$private(0x0, 0x6, 0x0) semtimedop(r0, &(0x7f0000000140)=[{}], 0x1, 0x0) 16:11:05 executing program 3: perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:11:05 executing program 0: socketpair(0x2b, 0x801, 0x0, &(0x7f0000000740)) 16:11:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000000553c000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:05 executing program 5: socket$netlink(0x10, 0x3, 0xa) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x1, 0x2, 0x0, 0x0, 0x0, {}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0xffffffff}, @CTA_EXPECT_CLASS={0x8}]}, 0x24}}, 0x0) [ 1390.892702][ T2392] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=513 sclass=netlink_route_socket pid=2392 comm=syz-executor.5 16:11:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x22, 0x0, &(0x7f0000000080)) 16:11:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:05 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x16}]}) 16:11:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000000553d000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:05 executing program 5: socket$netlink(0x10, 0x3, 0xa) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x1, 0x2, 0x0, 0x0, 0x0, {}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0xffffffff}, @CTA_EXPECT_CLASS={0x8}]}, 0x24}}, 0x0) 16:11:05 executing program 0: clock_gettime(0x0, &(0x7f0000000140)={0x0}) pselect6(0x40, &(0x7f0000000080)={0x5}, &(0x7f00000000c0)={0x7}, &(0x7f0000000100), &(0x7f0000000180)={r0}, 0x0) 16:11:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000000553e000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:05 executing program 1: mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x20132, 0xffffffffffffffff, 0x10000000) 16:11:05 executing program 5: socket$netlink(0x10, 0x3, 0xa) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x1, 0x2, 0x0, 0x0, 0x0, {}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0xffffffff}, @CTA_EXPECT_CLASS={0x8}]}, 0x24}}, 0x0) 16:11:05 executing program 0: perf_event_open(&(0x7f0000003a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30063, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:11:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000000172800000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) [ 1391.059188][ T24] audit: type=1326 audit(1628352665.431:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=2411 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 16:11:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000000003f000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:05 executing program 3: socketpair(0x2b, 0x801, 0xccf, &(0x7f0000000740)) 16:11:05 executing program 1: perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:11:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPCTNL_MSG_EXP_GET(r0, 0x0, 0x0) 16:11:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000000553f000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000300)={&(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) 16:11:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:05 executing program 1: socketpair(0x22, 0x2, 0x3, &(0x7f0000000480)) 16:11:05 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001600)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000002b80)={0x0, 0x0, 0x0}, 0x22) 16:11:05 executing program 0: perf_event_open$cgroup(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:11:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000040000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPCTNL_MSG_EXP_GET(r0, 0x0, 0x0) 16:11:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:05 executing program 0: socketpair(0x18, 0x0, 0x2, &(0x7f0000004140)) 16:11:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPCTNL_MSG_EXP_GET(r0, 0x0, 0x0) 16:11:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000005540000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:05 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000007c0)='ns/net\x00') 16:11:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:05 executing program 0: socketpair(0x1e, 0x0, 0x4, &(0x7f0000000200)) 16:11:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 16:11:06 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0xf) 16:11:06 executing program 1: perf_event_open$cgroup(&(0x7f00000002c0)={0x600, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:11:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000005541000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000000004800000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 16:11:06 executing program 0: socketpair(0x18, 0x0, 0x1, &(0x7f0000004140)) 16:11:06 executing program 3: perf_event_open$cgroup(&(0x7f00000002c0)={0x7, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:11:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 16:11:06 executing program 1: perf_event_open(&(0x7f0000003a00)={0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:11:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000005542000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:06 executing program 3: perf_event_open$cgroup(&(0x7f00000002c0)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:11:06 executing program 0: socketpair(0x26, 0x5, 0x0, &(0x7f00000015c0)) 16:11:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 16:11:06 executing program 3: perf_event_open$cgroup(&(0x7f00000002c0)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44840, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:11:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000005543000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:06 executing program 1: perf_event_open$cgroup(&(0x7f00000002c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:11:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 16:11:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000000006800000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:06 executing program 3: perf_event_open$cgroup(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x44840, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:11:06 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0xf) 16:11:06 executing program 1: socketpair(0x1d, 0x2, 0x6, &(0x7f0000000480)) 16:11:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000005544000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 16:11:06 executing program 3: socketpair(0x26, 0x5, 0x1ff, &(0x7f00000015c0)) 16:11:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000000006c00000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:06 executing program 0: perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:11:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000005545000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:06 executing program 1: perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x20000340, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:11:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x1, 0x2, 0x0, 0x0, 0x0, {}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0xffffffff}]}, 0x1c}}, 0x0) 16:11:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() getpid() recvmsg$unix(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) sendmsg$unix(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 16:11:06 executing program 3: socketpair(0x21, 0x0, 0x0, &(0x7f0000000340)) 16:11:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000005546000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000000007a00000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x1, 0x2, 0x0, 0x0, 0x0, {}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0xffffffff}]}, 0x1c}}, 0x0) 16:11:06 executing program 1: unlink(&(0x7f00000007c0)='./file0\x00') 16:11:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000005547000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000000018000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:07 executing program 1: perf_event_open$cgroup(&(0x7f00000002c0)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:11:07 executing program 3: socketpair(0x2, 0x0, 0xf45, &(0x7f0000000080)) 16:11:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x1, 0x2, 0x0, 0x0, 0x0, {}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0xffffffff}]}, 0x1c}}, 0x0) 16:11:07 executing program 0: perf_event_open(&(0x7f0000003a00)={0x1, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:11:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000005548000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:07 executing program 1: socketpair(0x2c, 0x0, 0x0, &(0x7f0000002880)) 16:11:07 executing program 3: socketpair(0x25, 0x1, 0x7, &(0x7f0000003780)) 16:11:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x1, 0x2, 0x0, 0x0, 0x0, {}, [@CTA_EXPECT_CLASS={0x8}]}, 0x1c}}, 0x0) 16:11:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000005549000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:07 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000540)="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", 0xec1}], 0x1}, 0x0) 16:11:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f00000000000000000100ffffff8c00000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x1, 0x2, 0x0, 0x0, 0x0, {}, [@CTA_EXPECT_CLASS={0x8}]}, 0x1c}}, 0x0) 16:11:07 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/time_for_children\x00') 16:11:07 executing program 1: socketpair(0x26, 0x0, 0x0, &(0x7f00000015c0)) 16:11:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000000554a000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:07 executing program 0: perf_event_open$cgroup(&(0x7f00000002c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:11:07 executing program 3: socketpair(0x25, 0x1, 0x1, &(0x7f0000004140)) 16:11:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x1, 0x2, 0x0, 0x0, 0x0, {}, [@CTA_EXPECT_CLASS={0x8}]}, 0x1c}}, 0x0) 16:11:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000000edc000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000000004b000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:07 executing program 0: perf_event_open$cgroup(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44840, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:11:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@tipc, 0x80, 0x0}, 0x0) 16:11:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x1, 0x2, 0x0, 0x0, 0x0, {}, [@CTA_EXPECT_ID={0x8}, @CTA_EXPECT_CLASS={0x8}]}, 0x24}}, 0x0) 16:11:07 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0xf) 16:11:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000000554b000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:07 executing program 3: perf_event_open(&(0x7f0000003a00)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:11:07 executing program 1: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000100)={0x1c, 0x1c, 0x3}, 0x1c) 16:11:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x1, 0x2, 0x0, 0x0, 0x0, {}, [@CTA_EXPECT_ID={0x8}, @CTA_EXPECT_CLASS={0x8}]}, 0x24}}, 0x0) 16:11:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:07 executing program 3: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x80, 0x0, 0x0) 16:11:07 executing program 0: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x8, &(0x7f0000000040)={0x1c, 0x1c, 0x2}, 0x1c) 16:11:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000000554c000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:07 executing program 1: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendto(r0, &(0x7f0000000080)="ef9cef44cb8b810c833f9826397bf82f4ae074a59d29178f0cef858765abfd27e9fee8dc1846e4f07e91da439d060f8bfcbe77a977e469f8386f3c134f12f955f83eeb3ac4e5f2301969b958d25b0db6a33a93fa3291fa720138e870e02d161aaf809ee5347e701555a331444dcab080d3e438680d", 0x75, 0x0, &(0x7f0000000100)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 16:11:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f00000000000000000100fffffdf900000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:07 executing program 3: socket$inet6(0x1c, 0x1, 0x0) 16:11:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x1, 0x2, 0x0, 0x0, 0x0, {}, [@CTA_EXPECT_ID={0x8}, @CTA_EXPECT_CLASS={0x8}]}, 0x24}}, 0x0) 16:11:07 executing program 0: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x1c) 16:11:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000000554d000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f00000000000000000100fffffdfd00000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:07 executing program 1: r0 = socket(0x2, 0x1, 0x0) sendto$inet(r0, &(0x7f00000013c0)="88", 0x1, 0x0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) 16:11:07 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r0, 0x0, 0x51, 0x0, 0x0) 16:11:07 executing program 3: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2e7af729cedbf27) 16:11:07 executing program 1: shmget(0x3, 0x2000, 0x240, &(0x7f0000ffe000/0x2000)=nil) 16:11:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000000554e000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:07 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg(r0, &(0x7f0000003780)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000003440)=[{&(0x7f0000000080)="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", 0x1000}, {&(0x7f0000001080)="1a750e20316c5b279c33c6a05566520c560fab58d96ea9506ed7a49a3ffce0ff657452dcb86fa9b29572be877ff1ac99acfbd795e3c2f41e", 0x38}, {&(0x7f00000010c0)="a5ff1bc5f7af63de7769e938bd875d1c0f8de1731deef4590185c3d0ccea0e76afe36aa5cdc7ee25ac1fef6e0b9981118de070be8f7e073d776e4c3dcdfa26b3a27a9a6cf97ccb0813fb2373f23cb02b2ab5c4a3055a8d302714df15495f06a8999658fdf37e87e87cb3c5f1c751489f78c29339d4b075ffc87c25a4c51edd87e77dab253b93048afb17d70d0ae38af5aceee51c32d8791e84f4de48a2f5dced587c45bc53b372b951050d228435214b0a620044d52b3cdc3b12733efed96c311bddc97f58bfa277d8614b67ad3a5f771fc383ba90a8fc37ba121e6e28888a996e2cf21719a7e5befc0c7003cf76f078a1913e49ef81eaf3f6b80460a60e3d97bc1a6fba226fb34182790f21ebecefda22367cea507b34070eca73af74b1b8a638288433383bac2147aa955f9e752d78e943e5f8dd4b88d722e1ed8d21b6b935191144896208873a30db395d508c8b1be44471d08d0fe84bdcab51f767ebeb0dbf05d313af044d8e323e9cf4d5de9535724a1aa29befdae70aea3078bd6862e360b2266cdf89aa0f0bcfe579b21f02f6b841a5c0afeb913c1df05e93f82c987947ed1005652d192ed508aba688aaa215deaee0b19a198fa41ac3ef99b9eb9dcf5752422b127987814a2bc6a95a4623ec3b25f727eb8c1b04c7be5d935cbf076aac84c605252a8e84cfea7d0b8ea525a1507ddf04b915971dd7aaebd2494f35c716dadeb0209a47e4801a3ff94f020d7c835b503f254ef92270a473bcae5fdbc718a790b404c58955397b259a4ca87759fc9e7a918947e605fbb553e6ce751ac7b7e624e55e519e6590918a9f23947440b40abdde355ee01d1ef3cf57de2e2a301aff09697ff0ee5fb5c6e30e7ec408fb9ba178f102a45e4f13f50e68dfe3544419ddefe86989158607fa583c123e7aefc4d071b6ebe7c7217e570db373d8d2a57053ad9e3c7af4a437406351cfa958c22e0b91165ff25e4042b51df4068e533cab37abd33022020b57e0b5b6ea018a1692ea8c16dc87794ffd70d08bc738cd0a69e74b32bbef17171c9ecc6876e7b4b45891a1f8de9f481278ad3220016b927d1d963932b72ccfe822e4cc70086a9b3f29161eb4dc5c7783f6f4593dd2bc3428594ddaa9ffc7c6d283bc0c20f60dd7fa8b9c62205c00fd436757e94d23d641e686eeb694396f06e2116cb8235cbeeebb59f52f14664844951e94f231ae602b315a24c5e04de89f62972d15ba44cd084c6696ea5ae4b4f8fc29287657bf376a40241fd5b02caec6a5f9a955adde0c5b3e88ffd6cc33f2603767f4887af3cb749300085ad4bf7321f8fdb7b55d3ffef4b6e9e2243bad25c6d1508838ca3dbbb718c7011f411bad81917edfa9f2d29bc4c686c5d946c30a090df58859731f4de5ebc9b8566ba08697841fe3e982aaca2f864c0ea7fa1e4c2b34087a32c4950f60fca268970626f7ce1e1a2454bacba380712bfe48d44c46d0e9ab127e855ba639f2926c42302d63ddc1afbd9db484f5a8704e5075c6361bcc8d90e15069dffe77837f52a2884aea85cc2ee56277f24978926365f370a9d08ddd8cfc3e02729185059538a64faeae2cc5af5d8e4134bbddae8dab63ea2f460b10070aeac31a1f9521f4f74aef206e0931774fc3c2ff379067df9fb15ff713b4c15a4c902323f8d41224ace4341ed258f1c9f294ab0e670c299dbee68f329f913febcc0f938b6a2f0eb6f34ca32c9c857b973397b68f45b752b940f221e579fd95868d4889d527e0dea376ad43d0d99011074ec46bb2993ca9bc3a6e425268a815dc2c965d5b7c6fa0daf9ace47512f163756bcb016eedd18f08347ff7f9853710d338185a491ee02ba8d7d278f64f5227ca61c86987e6bcccdc1f831eb8a7b3db327f4865ec52001157998330b54d32e82c5c49c75094b2cf14214a802793fdfe7a600563e385c695289d98ab9c78b8b0c2596c476d0dd1af1cb4ec83ac263223b9099b60fe69e336fb685563b2f5188ecd132be0d1f11a20be5717a7f01db17188619ce799411d16559533eacefdf6c52d136fece111b42d0854c04b7c62677685bb24420c3999664d639f3378d101286c0087536194b696a5a04d31582498afa40e8b56eefa85db728ef01fd0ab1ef63edc3a2696306568dd7942e1353011f8058fc8b737262c3db2160e2db67460a5cc928ad65c4f335883fe355a0a3ce341ecad3608bd2505999127759aa47a16b6f07d2aebf50ee567f1811e9682005c48af23d4e7b66cd18584338a24a44f2bd3be1b01f22f1cd84c20ff93a17ce1813a635e21ded6b1905538ac277177f5b11822ce1bd10763f6f2947072e4f16c6264c240dfc8eea6ff631c5ee51ae689e7e1e056bd1f56a6d93187712e8b7e7e83a9701d7c0adf48749a7260df629275e9e056ebd98f3011d4817c4905ddba5cdb82c26c16e27e67164965aea36ffaa92816d413fd58fde9e72712b14ece7a83e2083356c4a173f6b6aa8df08f6d9f625510fe68d18b8d7e61657a23ede832846d7943cfff5e1f6a438915c2ae60b38e21daeb993ad61f434fcafc99a541cd47b34b71db2516408b5ee94ccfa261f68fb77b748364c64e7477bfda83495a13a10f9d4339060012d6ec88dd9fc4ee6f13116396748f8680f3168dc0f375dd8c4d6408ff54785d6f9ebcb346cde409b46d45f6a62e608fcca8409989b7a321f7af0685503b2864f0e88f9fca66e8693344942cc58aa966aeaa73db829f7c9dc19a65196128bcaa7156b830cb0ba1e4d9b167af06bae4cd9f921889bbbde006f68f7463405c4fbc15f7a7fc1f14f4a256730c9ddc2fb483ef4f1633fd523150952dcde1207074fbc1e120e38f681400c39312af1c5e3795938d177401a597808a51d3de729b4f6acdab95b7faae0ebce6284a9b8db3bbe06fd3984bddd60d2ac31a04a7960fdb4710b8aa9d2d9bcd1e12ce70204cf82f87abf621038a9901fa858f3e5c8a00da52c0d450ea4ecaa31a0632984e797e5f9d31773ec9022080fa1e800c17f35f2bc6adad30c9a4cf212c52ecf2319a8a2bd4ada2f73fb27c27ee4598af31a4dd371eb5d141d1c0fe51489b0d65f7027a261e73d54f8121e8fc6b6a8f8c44509a725fd37f30f70f0dc421eced6d2335631bebc64aa3d82f5ead1ec65aecca0e2798bb7f2fe75136e22f57fca8a796325b2d57200cea3b6d92f8e60fb9d7cfddbcf7a22aefb33291e36c18da7d0fad38dd8fcaa29b13a754bef3937f473c82cd996916de072789d4e10829f574312aca4b2b7f7ba12d1100008cc919c1ab0c08a3953948861dfef9814608d4ec31d9ba9468d930f8dfbc4f7b6947a1f5d7a477119aa27d61a1aff41a07a15ddb9f3dc45b8b68d02239cb0d3cb3d59e73abdc1d78dc7e077400548cb0813488405bf7b12e364a09fc772d624a10ee730538640cc0a06b600b8b440f55dd1d7efd1424b408a486922c911b550a5965eaababa930097b38f45f5d2c20e6d66c7e7cf323b8df20f352ea0df1eb85eb506e51f56d78aec08b8a82feeaa51467618b0b5192f96eb76563c0c87008d9042606032df7d15ac01e3fafabb4a256fb2c2aa4e59d5a8622a54d9dcb35d20e802db23f9770d6f48700215acbdeb3f6a3cd44e7f7423cb26708a9f691e347b5e8feb969d8728719084077229e4d26f4a3e23c255e883bbc2685895eb91a502bd1dc35a1ce51492e902aba50db6f24637c2ddab4a4f403afa62d2f94d6a3548b9a92f331b912d813c5581366da34791cf89afee90f388fd9594c52a0bfde2a99db444f8de8f2078c754603b39aa5c8306823bde426855d3c474b62820f15dd114f63adbd599e248f5b645ae317dfe6f9245f9782fa24288fa6acb03329604ca1e1f5ec8a93e682e4a5cda083b3b1c10db13d3d618290f7a3826d2d82c2b066cd02adfa3a3cf670318c6c37a492896f5a219f346cfa3072f77934f38f30cd9d9fc165bcb6e83637cce6f6257e95da4397306d1a1f63cdd3f2e04d4bc533fb3c6014692830b2056ad56de6389048c7c6760de4a760000aceb571284c615e0bdf1fdab29b14f53c44325f51743c914bfebd44ab59454f062fd9f932c5cdf8302d18f7fb751736728d6cc68435571eaa855db58f06245b835d039341fa4178da3406e6125ba9f517dc2513a1d26f9eb95f70a2b0318067a2876f65a53ee370e92132770a1895889e96f7dec5ac0431032fe4b2ad3f4cfa1efab0f72c8793ae251b9acfc3d2425f179c040eae20b187b511ced56a3648824414b82eafca18b016fbd1fc254375c58f50970ee379b9c6d20543ea80aa0e5ff1fe14b71f99c8c0e794c8bf0c4bdf152a3aee306d9351bb51b3730b40e2afdaa11557c039e03270815f2fe79ebe108cdb7b937d6ad049afd810a4c2a0747ac3ab74213ad0a6010150a1ca9d13e7d458d1658ed3b0d8f8160062db4b055681b24fc366d8adee4072645a7eebf6ebf1b525fbb6da1a8d91abab26d0e53ce26c597324f5756f7bc73b65606d5b6ef9df97e39d66440b64988e9fcfd8e82237ba3131d402ab9c008c8aeee5304cd851ffd2b1d1179a20f61a52954d9d6052bebd898b4d3c240e5983a7868fc976a5def95fd332c0090a9261c728411434cdace17beff1f651614ee08fb24fec1324f71e3a89d18afe326364be794664f4b9096afa23cb98e3716588cfa4e355a7973d03ad838059791102b1a7a7e1b828578f45033dbae09ae1a1bdb108f29469f8cb75965c85bb2561bd94e4318e106d250041a0837efe01aaed93f915a51252bcdbb17034dd018e7275388b70abc36ad180e105cac9dec3c64009c5b3a0244007bc3fb8e91ca95dfd2b831ab5fb8aeb06164ebe8817dc0425dfc08de80c3b3a0e6c9471c34992dbadffc38f01db6d5102cef9e965980e8f906cc2a36dbeaa8a84372df67664335320d892d888ac29dca61da005018acb4a60edef4a80ae4498d569f52f17f813c15a66772d2ce344597dca3a7dbcd7c501034c0b3cfc2e27269077a2f95714049824d0ec9aee23f29c44a55fc1c2f9372f3d15d44edfacbe6e0d4f9208901aa95d9075978bff899502e6e43822a733788601a5b0d6c341b07cfb99ee5da042c88fbb922873c2d7c8ff9f414ebaab15b36bef7a6daae0028a35b19ac5d0f11b8de17a64b365ff599093fcca3aa36f489521283a35201f396bcfb5b1950c3fb8fa4c5617fc5a7927ab6423b796e0ce41dce33d309b0479e5e329aa16a329391c9447d56e8f989d8dcedbaf883040e6e5846282ae001430cb798139d727cb4ff46bbf678883c3064809afe106e97cb9dc3ce142604af732079720c798d2c601b864e5d7f1999a715194807b41c369540c6d833c21a1dd8d993fb2525c611d1a231bd1669bdaaa0cd5174a5e4aa9d4cd5ac0a098b15adb7f1f6fcaee43781093d99458265768699b7c0c112dcad81e55cd3fb8b7131c1e1ac9ff3be0df430c54673c8318636dd917d7757e28dd15dd4e979329de9c21dac3afeaecf6be7cd88c3514e6cf5438e7f044f7443f1b95e99c89fefe4603335849540128d10077bd24c9c2a723d9e2dd02d861c25efbb4d3c62053dbed14c9044d0e90a430984ef2658a663da0d115cc938a520929ebb727a8371e3f346868a43eb0df8ab661f8651ee774f6d8bb3a71c0f4354a011bdcf1942eb73200714e36632a89116b21bed398633a3a0cc67b00f3bdf29d3615565bdddebc89c5977f82a7ad8ba2ed10b386b2e6e81b8200b0a2b9fbeb42814c46c7b529b2ac3e283f4868b7609c828b401f3801aee0782b89e388", 0x1000}, {&(0x7f00000020c0)="e88f497a9a5e23f44615a2e818e015e27b22faf01769", 0x16}, {&(0x7f0000002100)="2e4049015f227d051a5d00e31a693fcf23a06a073ffe05f5cbd66df2522f", 0x1e}, {&(0x7f0000002140)="360ffeb54c2e92567f3ed2c46551fba3a31793afb30493d223260345e68e73de8f32e1de57e70d09221ff19c4fc34cd4afa51eb2545c5c4d5855158eaf0f6d16878cdb150d30e57e53f90819f556b70e7cf5cf1dc004a4efbca842361998a3e8ce68fdcf43dc55f00467adb3099c300edb59aa2bc4ebfb96271baa8f7a0e4afccbc75d0e8facc902018c147447786aa8caf5e5d7e69db4d93f9078722591f854301d1075883b2a1e509a6c36496aca8315e16d327c251aa91796bb21e91a35c1eb4591726741a26b07fafc", 0xcb}, {&(0x7f0000002240)="41c323bcea1fc9c3aebb554a32fe44fbe6dfb0143aac6190233e8b4ffd85eccbbbbf0ccee3411275da67377724ffebcfdbaaceac3f1e895c509f9fa4c8b2f3c86854a6b52e6e803a710b661217661c8ba8640d3e94a0c0e0cf6c", 0x5a}], 0x7, &(0x7f0000003500)=ANY=[], 0x270}, 0x0) 16:11:07 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom(r0, 0x0, 0x0, 0x81, 0x0, 0x0) 16:11:07 executing program 3: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x2b, 0x0, &(0x7f0000000040)) 16:11:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:07 executing program 0: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x52, &(0x7f00000000c0)={0x0, {{0x1c, 0x1c, 0x2}}, {{0x1c, 0x1c}}}, 0x108) 16:11:07 executing program 1: shmget(0x3, 0x1000, 0x606, &(0x7f0000ffe000/0x1000)=nil) 16:11:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000000554f000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:07 executing program 3: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x54, 0x0, 0x0) 16:11:07 executing program 5: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:11:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000050000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:07 executing program 1: mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x410, 0xffffffffffffff9c, 0x0) 16:11:07 executing program 5: r0 = socket(0x1c, 0x10000001, 0x84) bind$inet6(r0, &(0x7f0000000100)={0x1c, 0x1c, 0x2}, 0x1c) 16:11:07 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0xffff, 0x1006, 0x0, &(0x7f0000000180)) 16:11:07 executing program 3: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 16:11:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000005550000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:07 executing program 5: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 16:11:07 executing program 1: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x28, 0x0, &(0x7f0000000080)) 16:11:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:08 executing program 0: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0x1c, 0x1c, 0x2}, 0x1c) 16:11:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000005551000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:08 executing program 3: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0x17, 0x1c, 0x1}, 0x1c) 16:11:08 executing program 5: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x50, &(0x7f0000000040)={0x3, {{0x1c, 0x1c, 0x1}}}, 0x88) 16:11:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:08 executing program 0: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/207, 0xcf}, 0x2) 16:11:08 executing program 1: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendto(r0, &(0x7f0000000080)="ef9cef44cb8b810c833f9826397bf82f4ae074a59d29178f0cef858765abfd27e9fee8dc1846e4f07e91da439d060f8bfcbe77a977e469f8386f3c134f12f955f83eeb3ac4e5f2301969b958d25b0db6a33a93fa3291fa720138e870e02d161aaf809ee5347e7015", 0x68, 0x0, &(0x7f0000000100)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 16:11:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000005552000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:08 executing program 3: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendto(r0, &(0x7f0000000080)="ef9cef44cb8b810c833f9826397bf82f4ae074a59d29178f0cef858765abfd27e9fee8dc1846e4f07e91da439d060f8bfcbe77a977e469f8386f3c134f12f955f83eeb3ac4e5f2301969b958d25b0db6a33a93fa", 0x54, 0x0, &(0x7f0000000100)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 16:11:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000005553000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:08 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x10, 0x2}, 0x10) 16:11:08 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0) 16:11:08 executing program 3: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) 16:11:08 executing program 5: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$sock_int(r0, 0xffff, 0x0, 0x0, 0x0) 16:11:08 executing program 0: link(&(0x7f00000000c0)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) 16:11:08 executing program 1: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2e, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x1, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) 16:11:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000005554000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:08 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000680), 0x1, 0x0) fcntl$setown(r0, 0x6, 0x0) 16:11:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000005555000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x400, 0x0, &(0x7f0000000000)=0x17) 16:11:08 executing program 1: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x51, &(0x7f00000000c0)={0x0, {{0x1c, 0x1c, 0x1}}}, 0x88) 16:11:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000056000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:08 executing program 0: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind(r0, &(0x7f0000000140)=@in={0x10, 0x2}, 0x10) 16:11:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000005556000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:08 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000080)='\x00', 0x2000000, 0x0) 16:11:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:08 executing program 5: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) bind(r1, &(0x7f0000000000)=@in6={0xfffffffffffffde5, 0x1c, 0x1}, 0x1c) 16:11:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x23, 0x0, 0x0) 16:11:08 executing program 1: mkdir(&(0x7f00000045c0)='./file0\x00', 0x84) 16:11:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0xffff, 0x0, 0x0, 0x0) 16:11:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000005557000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:08 executing program 1: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0xa, 0x0, &(0x7f0000000080)=0x5c) 16:11:08 executing program 5: r0 = socket(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendto$inet(r0, &(0x7f00000013c0)="88", 0x1, 0x0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) 16:11:08 executing program 0: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000380)={0x1c, 0x1c, 0x2}, 0x1c) 16:11:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:08 executing program 3: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x32, 0x0, &(0x7f0000000000)) 16:11:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000005558000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:08 executing program 5: getresuid(0xffffffffffffffff, 0x0, &(0x7f0000000080)) 16:11:08 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r0, 0x0, 0x9, 0x0, 0x0) 16:11:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:08 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x52, &(0x7f0000000100)={0x0, {{0xffffffffffffff49, 0x2}}, {{0x10, 0x2}}}, 0x108) 16:11:08 executing program 0: r0 = socket(0x2, 0x3, 0x0) getsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) 16:11:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000005559000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:08 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r0, 0x0, 0xe, 0x0, 0x0) 16:11:08 executing program 5: accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0) bind(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c) sync() 16:11:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:08 executing program 1: msgctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000140)={{0xffffffffffffffff, 0x0, 0xffffffffffffffff}}) 16:11:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000000555a000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:08 executing program 3: r0 = socket(0x1c, 0x3, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x52, &(0x7f0000002640)={0x0, {{0x1c, 0x1c, 0x3}}, {{0x1c, 0x1c}}}, 0x108) 16:11:08 executing program 0: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=@un=@file={0xa}, 0xa) 16:11:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000140), &(0x7f0000000180)=0x10) 16:11:08 executing program 1: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$sock_int(r0, 0xffff, 0x200, 0x0, 0x0) 16:11:08 executing program 3: r0 = socket(0x1c, 0x10000001, 0x84) setsockopt$sock_int(r0, 0xffff, 0x10000, &(0x7f0000000040), 0x4) 16:11:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000064000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:08 executing program 5: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendto(r0, &(0x7f0000000080)="ef9cef44cb8b810c833f9826397bf82f4ae074a59d29178f0cef858765abfd27e9fee8dc1846e4f07e91da439d060f8bfcbe77a977e469f8386f3c134f12f955f83eeb3ac4e5f2301969b958d25b0db6a33a93fa3291fa720138e870e02d161aaf809ee5347e701555a331444dcab080d3e438680d92ae60", 0x78, 0x20000, &(0x7f0000000100)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 16:11:08 executing program 0: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x1c, 0x1c, 0x2}, 0x1c) 16:11:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000003000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:08 executing program 1: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2e, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x1c, 0x1c, 0x2}, 0x1c) 16:11:08 executing program 3: r0 = socket(0x1c, 0x10000001, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 16:11:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00ffff88812fc20c98000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:08 executing program 3: r0 = socket(0x1c, 0x10000001, 0x84) sendto$inet6(r0, &(0x7f0000000040)='N', 0x1, 0x0, &(0x7f0000000100)={0x1c, 0x1c, 0x2}, 0x1c) 16:11:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000004000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:08 executing program 1: r0 = socket(0x1c, 0x10000001, 0x84) sendmsg$unix(r0, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=[@cred, @cred], 0xd0}, 0x0) 16:11:08 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto(r0, &(0x7f0000000000)="8be1ca0dff65e405484ac195e7bc9da6c0f3306b1f74d18f92b54a88d468d0fc3a831d02913fdb17413ff15ae5be195a8d827431ce7684c15b5332a4ab745c6da7b0043f169c506ac620a080779b5ec30bd08ab7c2b985bd7ad4648a252e0e042645e09006a60798b01b38ecdfe6e751535f19749f392e44c6ae67769bb6c5780c8f9a33e267f4eefe6aabe34052fb73475c0294bf", 0x95, 0x0, &(0x7f0000000100)=@in={0x10, 0x2}, 0x10) 16:11:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000000000003b3000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:09 executing program 0: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$sock_int(r0, 0xffff, 0x200, &(0x7f0000000140), 0x4) 16:11:09 executing program 1: shmat(0xffffffffffffffff, &(0x7f0000fff000/0x1000)=nil, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fff000/0x1000)=nil, 0x0) 16:11:09 executing program 3: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) 16:11:09 executing program 5: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendto(r0, &(0x7f0000000080)="ef9cef44cb8b810c833f9826397bf82f4ae074a59d29178f0cef858765abfd27e9fee8dc1846e4f07e91da439d060f8bfcbe77a977e469f8386f3c134f12f955f83eeb3ac4e5f2301969b958d25b0db6a33a93fa3291fa720138e870e02d161aaf809ee5347e701555", 0x69, 0x0, &(0x7f0000000100)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 16:11:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000000000026b5000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:09 executing program 1: clock_nanosleep(0x0, 0x0, &(0x7f0000000140)={0x0, 0xffffffff7fffffff}, 0x0) 16:11:09 executing program 0: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x24, 0x0, &(0x7f0000000000)) 16:11:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000000000002b9000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:09 executing program 5: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x53, &(0x7f0000000080)={0x0, {{0x1c, 0x1c, 0x1}}, {{0x1c, 0x1c, 0x1}}}, 0x108) 16:11:09 executing program 1: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x6) 16:11:09 executing program 3: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x39, &(0x7f0000000000), &(0x7f0000000040)=0x4) 16:11:09 executing program 0: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) sendmsg(r0, &(0x7f00000013c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x105) 16:11:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:09 executing program 1: r0 = socket(0x1, 0x1, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4, 0x10, r0, 0x0) 16:11:09 executing program 5: fchownat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0) 16:11:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000000000003bb000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:09 executing program 3: r0 = socket(0x10, 0x803, 0x2) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 16:11:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:09 executing program 1: perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 16:11:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @local, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) 16:11:09 executing program 0: perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040), &(0x7f0000000000), &(0x7f00000002c0)='s', 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 16:11:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000000000003bc000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:09 executing program 3: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000440)='R', 0x1, r0) keyctl$read(0xb, r1, 0x0, 0x0) 16:11:09 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) 16:11:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000000000003bd000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000b40)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$unix(r0, &(0x7f0000002c40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002bc0)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0) 16:11:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000000000003be000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:09 executing program 0: poll(0x0, 0x0, 0xe5) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000003c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000240)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) clone(0x49104100, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 16:11:09 executing program 5: poll(0x0, 0x0, 0xe5) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000003c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clone(0x49104100, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 16:11:09 executing program 1: r0 = socket(0x1, 0x1, 0x0) getsockname(r0, 0x0, &(0x7f0000000100)) 16:11:09 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000002bc0)=[{{&(0x7f0000000040)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local}}}], 0x20}}], 0x1, 0x0) 16:11:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:09 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000440)=[{{&(0x7f0000000000)={0x2, 0x4e24}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @ip_tos_u8={{0x11}}], 0x38}}], 0x1, 0x0) 16:11:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000000000003bf000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:09 executing program 3: r0 = socket(0x2a, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000001c0)) 16:11:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f00000000000000000100000b000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:09 executing program 1: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x24, r0, 0x1, 0x0, 0x0, {{}, {@void, @val={0x28}}}, [@NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}]}, 0x24}}, 0x0) 16:11:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000000000003c0000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) [ 1395.022230][ T3039] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1395.033845][ T3047] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 16:11:09 executing program 0: r0 = socket(0x28, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) [ 1397.498313][ T3010] ================================================================== [ 1397.506583][ T3010] BUG: KCSAN: data-race in do_notify_parent_cldstop / do_signal_stop [ 1397.514632][ T3010] [ 1397.516947][ T3010] write to 0xffff88813fb1c120 of 4 bytes by task 3059 on cpu 0: [ 1397.524573][ T3010] do_signal_stop+0x100/0x710 [ 1397.529228][ T3010] get_signal+0xa29/0x15e0 [ 1397.533620][ T3010] arch_do_signal_or_restart+0x2a/0x220 [ 1397.539145][ T3010] exit_to_user_mode_prepare+0x109/0x190 [ 1397.544778][ T3010] syscall_exit_to_user_mode+0x20/0x40 [ 1397.550216][ T3010] do_syscall_64+0x49/0x90 [ 1397.554612][ T3010] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1397.560482][ T3010] [ 1397.562784][ T3010] read to 0xffff88813fb1c120 of 4 bytes by task 3010 on cpu 1: [ 1397.570298][ T3010] do_notify_parent_cldstop+0x1a3/0x280 [ 1397.575823][ T3010] get_signal+0x418/0x15e0 [ 1397.580217][ T3010] arch_do_signal_or_restart+0x2a/0x220 [ 1397.585741][ T3010] exit_to_user_mode_prepare+0x109/0x190 [ 1397.591351][ T3010] syscall_exit_to_user_mode+0x20/0x40 [ 1397.596792][ T3010] do_syscall_64+0x49/0x90 [ 1397.601190][ T3010] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1397.607071][ T3010] [ 1397.609417][ T3010] value changed: 0x00000000 -> 0x00000016 [ 1397.615210][ T3010] [ 1397.617512][ T3010] Reported by Kernel Concurrency Sanitizer on: [ 1397.623649][ T3010] CPU: 1 PID: 3010 Comm: syz-executor.5 Not tainted 5.14.0-rc4-syzkaller #0 [ 1397.632314][ T3010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 16:11:12 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_MODE(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000380)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 16:11:12 executing program 3: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000540), 0x0) 16:11:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000000000026c3000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r0, &(0x7f0000002900)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:11:12 executing program 0: socketpair(0xb, 0x0, 0x0, &(0x7f0000002300)) [ 1397.642368][ T3010] ================================================================== 16:11:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_COALESCE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x14, r1, 0xa11, 0x0, 0x0, {{}, {@void, @void, @void}}}, 0x14}}, 0x0) 16:11:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000000000003e0000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000b40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000002c40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002bc0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 16:11:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:12 executing program 5: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x24, r0, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}]}, 0x24}}, 0x0) 16:11:12 executing program 0: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x20, r0, 0x1, 0x0, 0x0, {{0x5f}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 16:11:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000000fffffff0000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:12 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_DEV(r0, 0xfffffffffffffffc, 0x0) 16:11:12 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_COALESCE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x30, r1, 0xa11, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @val={0xc}}}}, 0x30}}, 0x0) 16:11:12 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_COALESCE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x30, r1, 0xa11, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x6e}, @val={0x8}, @val={0xc, 0x99, {0x0, 0x4f}}}}}, 0x30}}, 0x0) 16:11:12 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000002a00)={0x14, 0x1, 0x9, 0x301}, 0x14}}, 0x0) 16:11:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000007ffffff2000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:12 executing program 0: pselect6(0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480), &(0x7f0000000540), 0x0) 16:11:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)={0x14, r1, 0x1, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) 16:11:12 executing program 1: socketpair(0x18, 0x0, 0x0, &(0x7f0000000480)) 16:11:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000000000003f3000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:12 executing program 0: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0xf7}, 0x0, 0x0) 16:11:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000011000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:12 executing program 5: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x24, r0, 0x1, 0x0, 0x0, {{0x7e}, {@void, @val={0xc}}}, [@NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}]}, 0x24}}, 0x0) 16:11:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:13 executing program 1: r0 = epoll_create1(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x2000000a}) 16:11:13 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r1) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, r2, 0x1}, 0x14}}, 0x0) 16:11:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)=@l2tp={0x2, 0x0, @dev}, 0x80) 16:11:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000000000003f4000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000022000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:13 executing program 1: r0 = socket$inet(0x2, 0x3, 0x9) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3c}}, 0x10) [ 1398.632802][ T3132] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 16:11:13 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000008c0)=@buf) 16:11:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000000000003f5000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000025000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:13 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg(r0, &(0x7f0000000880)={&(0x7f0000000740)=@l2tp6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x80, 0x0}, 0x0) [ 1398.676631][ T3155] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 16:11:13 executing program 5: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x2af32cbb8798b632, 0x0) 16:11:13 executing program 1: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x20, r0, 0x1, 0x0, 0x0, {{0x7e}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 16:11:13 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000008c0)=@buf) 16:11:13 executing program 3: socketpair(0x23, 0x0, 0x2, &(0x7f0000000100)) 16:11:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000000000003f6000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:13 executing program 5: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r1, &(0x7f00000051c0)={0x0, 0x0, &(0x7f0000005080)}, 0x0) sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x20, r0, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc, 0x99, {0x0, 0xffffffff}}}}}, 0x20}}, 0x0) 16:11:13 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000001980)={0xffffffffffffffff}) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000640)={0xfffffffffffffffd, 0x0, &(0x7f0000000600)={0x0}}, 0x0) 16:11:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000000000003f7000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)={0x14, r1, 0x1, 0x0, 0x0, {0x10}}, 0x14}}, 0x0) 16:11:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x20, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}, 0x69}, 0x0) 16:11:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_PMKSA(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) [ 1398.781894][ T3179] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1398.817337][ T3188] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 16:11:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000000000003f8000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:13 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x0, 0x989680}, &(0x7f0000000380)={&(0x7f0000000340)={[0x8]}, 0x8}) 16:11:13 executing program 1: socketpair(0x11, 0xa, 0x0, &(0x7f0000000300)) 16:11:13 executing program 3: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080), 0x0, 0x0) 16:11:13 executing program 5: pselect6(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000540), 0x0) 16:11:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000007ffffff8000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:13 executing program 0: pselect6(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)={0x77359400}, &(0x7f0000000180)={&(0x7f0000000140)={[0x6]}, 0x8}) 16:11:13 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg(r0, &(0x7f0000000880)={0x0, 0x0, 0x0}, 0x0) 16:11:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000007ffffff9000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg$unix(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000002, 0x0) 16:11:13 executing program 5: r0 = socket(0x11, 0xa, 0x0) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 16:11:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000007fff000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect(r0, &(0x7f0000000000)=@rc={0x1f, @none}, 0x80) 16:11:14 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000140)={0x28, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_AF={0x6}]}]}, 0x28}}, 0x0) 16:11:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000007fffffff000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000074000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:14 executing program 0: clock_gettime(0x3, &(0x7f0000005740)) 16:11:14 executing program 3: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r1, &(0x7f00000051c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x20, r0, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 16:11:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000000ffffffff000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:14 executing program 1: socketpair(0x23, 0x2, 0x0, &(0x7f0000002400)) 16:11:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_COALESCE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x30, r1, 0xa11, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x6e}, @val={0x8}, @val={0xc}}}}, 0x30}}, 0x0) 16:11:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000002000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:14 executing program 5: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x20, r0, 0x1, 0x0, 0x0, {{0x2}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 16:11:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000003000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getpeername$unix(r0, 0x0, &(0x7f0000000400)) 16:11:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f0000000000000000010000fe000000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:14 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000002e00)=[{{&(0x7f0000000000)={0x2, 0x4e22, @dev}, 0x10, 0x0, 0x0, &(0x7f00000003c0)=[@ip_retopts={{0x14, 0x0, 0x7, {[@rr={0x7, 0x3, 0xd5}]}}}], 0x18}}], 0x1, 0x0) 16:11:14 executing program 5: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000180)={&(0x7f0000000140)={[0x6]}, 0x8}) 16:11:14 executing program 3: socketpair(0x2, 0x3, 0x8, &(0x7f0000000080)) 16:11:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x44, 0x3, 0x1, 0x3, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x30, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @remote}}}]}]}, 0x44}}, 0x0) 16:11:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000080010000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000004000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:14 executing program 1: r0 = socket(0x11, 0x2, 0x0) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 16:11:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000004020000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:14 executing program 0: pselect6(0x40, &(0x7f0000000000)={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0) 16:11:14 executing program 1: socketpair(0x3, 0x0, 0x31e1, &(0x7f0000000140)) 16:11:14 executing program 3: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x20, r0, 0x1, 0x0, 0x0, {{0x1a}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 16:11:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000005000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:15 executing program 1: clock_gettime(0x0, &(0x7f0000000500)) 16:11:15 executing program 5: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x20, r0, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc, 0x117}}}}, 0x20}}, 0x0) 16:11:15 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000003340)='ns/pid\x00') 16:11:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000006000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:15 executing program 3: socketpair(0x28, 0x0, 0xfff, &(0x7f0000000000)) 16:11:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:15 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r1) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x20, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}]}, 0x20}}, 0x0) 16:11:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000007000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:15 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x38}, 0x38}}, 0x0) pipe(&(0x7f0000001140)) pipe(&(0x7f0000001140)) pipe(&(0x7f0000001140)) pipe(&(0x7f0000000440)) pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x7ff}, &(0x7f0000000140)={0x0, 0x3938700}, 0x0) 16:11:15 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000040), 0x8) sendmsg$inet6(r0, &(0x7f0000002e40)={&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c, 0x0}, 0x0) 16:11:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xc7225809}, 0x42) 16:11:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xd, &(0x7f0000000080), 0x4) 16:11:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000008000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000002a00)={0x14}, 0x14}}, 0x0) 16:11:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)={0x14, r1, 0x1, 0x0, 0x0, {0x11}}, 0x14}}, 0x0) 16:11:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000009000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:15 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x1, 0x1, 0xdc8b9b8183629519}, 0x14}}, 0x0) 16:11:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000004060000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:15 executing program 1: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x0, 0x989680}, 0x0) 16:11:15 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000002bc0)=[{{&(0x7f0000000040)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000011c0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x8}}], 0x18}}], 0x1, 0x0) 16:11:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000a000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:15 executing program 0: pselect6(0x0, 0x0, 0x0, &(0x7f0000000480), &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580), 0x8}) 16:11:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000b000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:15 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, 0x0, 0x0) 16:11:15 executing program 3: pselect6(0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 16:11:15 executing program 5: socketpair(0x11, 0xa, 0x3b, &(0x7f0000000300)) 16:11:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:15 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_MODE(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000380)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}}, 0x0) 16:11:15 executing program 1: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x20, r0, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc, 0x12d}}}}, 0x20}}, 0x0) 16:11:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000c000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:15 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002a40)={0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f000000c940)=[{{0x0, 0x0, 0x0}}], 0x1, 0x1, 0x0) 16:11:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f0000000000000000010000000a0000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000d000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000001500)={&(0x7f0000000040), 0xfffffffffffffcf7, &(0x7f00000014c0)={&(0x7f00000015c0)=ANY=[@ANYBLOB="70120000", @ANYRES16, @ANYBLOB="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", @ANYRES32, @ANYBLOB="08000700810000000807000000000000009eedbbe6000100ac0800010000000000000000", @ANYRES32=0x0, @ANYBLOB], 0x1270}, 0x1, 0x0, 0x0, 0x4}, 0x850) 16:11:15 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={r2, 0x1, 0x6, @broadcast}, 0x10) 16:11:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f0000000000000000010000000b0000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r1, 0x1}, 0x14}}, 0x0) 16:11:16 executing program 1: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0xf7}, 0x0, &(0x7f0000000180)={&(0x7f0000000140), 0x8}) 16:11:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000e000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)={0x18, r1, 0x1, 0x0, 0x0, {0x10}, [@IPVS_CMD_ATTR_SERVICE={0x4}]}, 0x18}}, 0x0) 16:11:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:16 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, 0x0) 16:11:16 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r0) sendmsg$IEEE802154_LLSEC_ADD_KEY(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x20, r2, 0x11, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}]}, 0x20}}, 0x0) 16:11:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000f000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:16 executing program 0: socketpair(0x22, 0x0, 0x20, &(0x7f0000000080)) 16:11:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000002b00)={&(0x7f0000000840), 0xc, &(0x7f0000000880)={&(0x7f0000002a00)={0x18, 0x1, 0x9, 0x301, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x4}]}, 0x18}}, 0x0) 16:11:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000010000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 16:11:16 executing program 5: perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0xffd}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040), &(0x7f0000000000), &(0x7f00000002c0)='s', 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:11:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f0000000000000000010000000e0000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000011000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:16 executing program 1: socketpair(0x26, 0x5, 0x7, &(0x7f0000000000)) 16:11:16 executing program 0: socket(0x11, 0xa, 0x0) 16:11:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmsg(r0, &(0x7f0000015440)={0x0, 0x0, 0x0}, 0x40000041) 16:11:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000012000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:16 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000500)={0x0, @in={0x2, 0x0, @loopback}, @l2tp={0x2, 0x0, @dev}, @xdp, 0x4}) 16:11:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000014000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:16 executing program 0: socketpair(0x22, 0x0, 0x0, &(0x7f0000000080)) 16:11:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000020100000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:16 executing program 1: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat$null(r0, &(0x7f0000000080)='./file1\x00', 0x200, 0x103) 16:11:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002480)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x4008140, 0x0, 0xfffffffffffffcdf) 16:11:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002480)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000000900)=[{{0x0, 0x0, 0x0}}], 0x1, 0x140, 0x0) 16:11:16 executing program 5: open$dir(&(0x7f0000000000)='./file0\x00', 0x80140, 0x15a) 16:11:16 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f00000013c0)={0x0, 0x0, 0x0}, 0x0) 16:11:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000018000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000019000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:16 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='oom_score_adj\x00') ioctl$sock_inet_SIOCGIFADDR(r0, 0x5451, 0x0) 16:11:16 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000003100), 0x0, 0x8000) 16:11:16 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0x8c342, 0x0) 16:11:16 executing program 5: open$dir(&(0x7f0000000000)='./file0\x00', 0x80140, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x2001, 0x85) 16:11:16 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) write$P9_RLOCK(r0, 0xfffffffffffffffd, 0x0) 16:11:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:16 executing program 3: open$dir(&(0x7f0000000000)='./file0\x00', 0xc0342, 0x0) statx(0xffffffffffffff9c, &(0x7f00000054c0)='./file0\x00', 0x100, 0x7ff, &(0x7f0000005500)) 16:11:16 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2a0c0, 0x110) 16:11:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000022000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:16 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f00000005c0)='./file0\x00', 0x6443, 0x102) 16:11:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:16 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmmsg(r0, 0x0, 0x0, 0x40002001, 0x0) 16:11:16 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x6000, 0x0) 16:11:16 executing program 0: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000040)='.log\x00', 0x20040, 0x0) openat$incfs(r0, &(0x7f0000000080)='.log\x00', 0x20000, 0x38) 16:11:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000025000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:16 executing program 5: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f00000015c0)='.log\x00', 0x81040, 0xa0) 16:11:17 executing program 1: r0 = epoll_create1(0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 16:11:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000000200000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:17 executing program 5: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x8240, 0x102) 16:11:17 executing program 3: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000180)='./file0\x00', 0x8, 0x0) 16:11:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00002e000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:17 executing program 0: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000040)='.pending_reads\x00', 0x1a9c43, 0x74) 16:11:17 executing program 1: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat$null(r0, &(0x7f0000000080)='./file0\x00', 0x8000, 0x103) 16:11:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:17 executing program 5: r0 = eventfd2(0x0, 0x0) r1 = epoll_create(0x7fffffff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) 16:11:17 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x20008801, 0x0, 0xfffffffffffffd79) 16:11:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000048000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:17 executing program 0: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) utimensat(r0, &(0x7f0000000200)='./file1\x00', 0x0, 0x0) 16:11:17 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0x80140, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x18) 16:11:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:17 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) sendto$unix(r0, 0x0, 0x0, 0xc080, 0x0, 0x0) 16:11:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00004c000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:17 executing program 5: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0xaa541, 0x0) write$P9_RLOPEN(r0, 0x0, 0xfffffffffffffec9) 16:11:17 executing program 3: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x100, 0x200, &(0x7f00000001c0)) 16:11:17 executing program 1: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x8240, 0x0) 16:11:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f000000000000000001000000250000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:17 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0x80140, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x20000, 0x27) 16:11:17 executing program 5: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat$null(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x103) fchmodat(r0, &(0x7f00000000c0)='./file0\x00', 0x81) execveat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) 16:11:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000060000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:17 executing program 3: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000040)='.pending_reads\x00', 0x140, 0x0) 16:11:17 executing program 1: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000080)='.log\x00', 0x20042, 0x1a1) 16:11:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:17 executing program 0: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x4) 16:11:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000068000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:17 executing program 3: open$dir(&(0x7f0000000000)='./file0\x00', 0x80140, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x44081, 0x52) 16:11:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:17 executing program 1: open$dir(&(0x7f0000007500)='./file0\x00', 0x40, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0xb00002dd) 16:11:17 executing program 5: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000040)='.pending_reads\x00', 0xa8c43, 0xe) 16:11:17 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0x80140, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x4000, 0x40, &(0x7f00000001c0)) 16:11:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00006c000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:17 executing program 3: open$dir(&(0x7f0000000000)='./file0\x00', 0x80140, 0x0) open$dir(&(0x7f0000000740)='./file0/file0\x00', 0x0, 0x0) 16:11:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:17 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x20040010, 0x0, 0x0) 16:11:17 executing program 5: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000040)='.log\x00', 0x442c2, 0x1b3) 16:11:17 executing program 0: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchmodat(r0, &(0x7f0000001a00)='./file0\x00', 0x1) 16:11:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000074000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:17 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) write$P9_RREADLINK(r0, 0x0, 0x60) 16:11:17 executing program 5: open$dir(&(0x7f0000000040)='./file0\x00', 0x181140, 0x61) 16:11:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:17 executing program 1: r0 = epoll_create1(0x0) write$P9_RLOCK(r0, 0x0, 0x0) 16:11:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00007a000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmmsg(r0, 0x0, 0x0, 0x40002041, &(0x7f0000001ec0)={0x0, 0x3938700}) 16:11:17 executing program 3: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f00000034c0)='.log\x00', 0x20042, 0x124) 16:11:17 executing program 5: open$dir(&(0x7f0000000040)='./file0\x00', 0x88342, 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{}, {0x77359400}}, 0x0) 16:11:17 executing program 1: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat$null(r0, &(0x7f0000000080)='./file0\x00', 0x40, 0x103) 16:11:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000003020000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:17 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) write$P9_RLINK(r0, 0xfffffffffffffffc, 0xffffffffffffffd1) 16:11:17 executing program 3: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000040)='.log\x00', 0x20040, 0x0) 16:11:17 executing program 5: open$dir(&(0x7f0000007500)='./file0\x00', 0x40, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x381004, 0x4e) 16:11:17 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0x80140, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x222400, 0x110) 16:11:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef030001000000dbf4655f0000000000000000010000004c0000000b00000000029fba2482b0ef57046b78d71bbb0eeb1b73bc8016cca420c17073d75f74d97f8dedc10700f90484ee8723de5132a669dc9d49f041c7283afc2ec7044ecbe433d7ef310de25f1a1e25cf6357fa35a8c5bb03a86dd9a5cc75c05db3e304496bb610c539e24d7336260c991fe7aa99e48f6b46b5f634dcb02714ead1902adc7921317172ea4b8454644232650045e4d8d99ed7967a85e6bfc73f8158ca496d2cfb7ddd491343f76c8f734b26d5b4f23b32351d559586e23118ab2f2a1be79a8d681209b282d6205570812ded97a00aeae96a44366ecec9af6b606540694e368149f5120987d5a62f5a63031a15913ae3acc7ffec2c008b199ffb6f6726f11639b9371d0f8c", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:17 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x20c0, 0x2) 16:11:17 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x0) 16:11:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000004020000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:17 executing program 5: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000040)='.log\x00', 0x20042, 0x0) 16:11:17 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0x80140, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x4000, 0x0, &(0x7f00000001c0)) 16:11:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:17 executing program 0: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000080)='.log\x00', 0xa8c43, 0x14) 16:11:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000030000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000040)="8081000000180000cdf4655fddf4655fddf4655f000000000014c6a95d00000010000800000000000af3020004000000000000050000000000430000000200000004b41a1ffcd49d12907bb9787c9ca37606b88f6dd45edfa39e5361558c1a38bc169eeee2f5bda6245f", 0x6a, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 16:11:17 executing program 5: open$dir(&(0x7f0000007500)='./file0\x00', 0x40, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x4000000) 16:11:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15d, 0x400}], 0x0, &(0x7f00000011c0)) 16:11:17 executing program 1: open$dir(&(0x7f0000000040)='./file0\x00', 0x101340, 0x0) 16:11:17 executing program 2: