[ OK ] Started OpenBSD Secure Shell server. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.56' (ECDSA) to the list of known hosts. 2021/06/16 10:00:23 fuzzer started 2021/06/16 10:00:23 dialing manager at 10.128.0.163:39743 2021/06/16 10:00:24 syscalls: 1998 2021/06/16 10:00:24 code coverage: enabled 2021/06/16 10:00:24 comparison tracing: enabled 2021/06/16 10:00:24 extra coverage: enabled 2021/06/16 10:00:24 setuid sandbox: enabled 2021/06/16 10:00:24 namespace sandbox: enabled 2021/06/16 10:00:24 Android sandbox: enabled 2021/06/16 10:00:24 fault injection: enabled 2021/06/16 10:00:24 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/06/16 10:00:24 net packet injection: /dev/net/tun does not exist 2021/06/16 10:00:24 net device setup: enabled 2021/06/16 10:00:24 concurrency sanitizer: enabled 2021/06/16 10:00:24 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/06/16 10:00:24 USB emulation: /dev/raw-gadget does not exist 2021/06/16 10:00:24 hci packet injection: /dev/vhci does not exist 2021/06/16 10:00:24 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2021/06/16 10:00:24 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 2021/06/16 10:00:25 suppressing KCSAN reports in functions: 'do_sys_poll' 'blk_mq_sched_dispatch_requests' '__xa_clear_mark' 'expire_timers' '__lru_add_drain_all' 'ext4_free_inodes_count' '__io_cqring_fill_event' 'ps2_do_sendbyte' 'generic_write_end' 'tick_sched_timer' 2021/06/16 10:00:25 fetching corpus: 0, signal 0/2000 (executing program) 2021/06/16 10:00:25 fetching corpus: 50, signal 16433/20051 (executing program) 2021/06/16 10:00:25 fetching corpus: 100, signal 27094/32101 (executing program) 2021/06/16 10:00:25 fetching corpus: 149, signal 35143/41429 (executing program) 2021/06/16 10:00:25 fetching corpus: 199, signal 38171/45826 (executing program) 2021/06/16 10:00:25 fetching corpus: 249, signal 43292/52092 (executing program) 2021/06/16 10:00:25 fetching corpus: 299, signal 47108/57057 (executing program) 2021/06/16 10:00:25 fetching corpus: 349, signal 49498/60626 (executing program) 2021/06/16 10:00:25 fetching corpus: 399, signal 51960/64243 (executing program) 2021/06/16 10:00:25 fetching corpus: 449, signal 55459/68674 (executing program) 2021/06/16 10:00:25 fetching corpus: 499, signal 57559/71805 (executing program) 2021/06/16 10:00:25 fetching corpus: 549, signal 60665/75739 (executing program) 2021/06/16 10:00:25 fetching corpus: 599, signal 63812/79621 (executing program) 2021/06/16 10:00:26 fetching corpus: 649, signal 66922/83411 (executing program) 2021/06/16 10:00:26 fetching corpus: 699, signal 68711/86010 (executing program) 2021/06/16 10:00:26 fetching corpus: 748, signal 70267/88436 (executing program) 2021/06/16 10:00:26 fetching corpus: 797, signal 74874/93239 (executing program) 2021/06/16 10:00:26 fetching corpus: 847, signal 77901/96673 (executing program) 2021/06/16 10:00:26 fetching corpus: 897, signal 79943/99265 (executing program) 2021/06/16 10:00:26 fetching corpus: 947, signal 81743/101628 (executing program) 2021/06/16 10:00:26 fetching corpus: 997, signal 86232/105967 (executing program) 2021/06/16 10:00:26 fetching corpus: 1047, signal 87713/107975 (executing program) 2021/06/16 10:00:26 fetching corpus: 1097, signal 89905/110479 (executing program) 2021/06/16 10:00:26 fetching corpus: 1147, signal 91426/112452 (executing program) 2021/06/16 10:00:26 fetching corpus: 1197, signal 92520/114051 (executing program) 2021/06/16 10:00:26 fetching corpus: 1247, signal 94227/116039 (executing program) 2021/06/16 10:00:27 fetching corpus: 1297, signal 95723/117901 (executing program) 2021/06/16 10:00:27 fetching corpus: 1347, signal 96648/119342 (executing program) 2021/06/16 10:00:27 fetching corpus: 1397, signal 99383/121969 (executing program) 2021/06/16 10:00:27 fetching corpus: 1447, signal 100950/123742 (executing program) 2021/06/16 10:00:27 fetching corpus: 1497, signal 102126/125270 (executing program) 2021/06/16 10:00:27 fetching corpus: 1547, signal 104151/127268 (executing program) 2021/06/16 10:00:27 fetching corpus: 1597, signal 105679/128944 (executing program) 2021/06/16 10:00:27 fetching corpus: 1647, signal 106895/130355 (executing program) 2021/06/16 10:00:27 fetching corpus: 1697, signal 107900/131639 (executing program) 2021/06/16 10:00:27 fetching corpus: 1747, signal 109321/133132 (executing program) 2021/06/16 10:00:27 fetching corpus: 1797, signal 110018/134166 (executing program) 2021/06/16 10:00:27 fetching corpus: 1846, signal 111016/135286 (executing program) 2021/06/16 10:00:28 fetching corpus: 1893, signal 111877/136395 (executing program) 2021/06/16 10:00:28 fetching corpus: 1943, signal 113072/137615 (executing program) 2021/06/16 10:00:28 fetching corpus: 1993, signal 113683/138557 (executing program) 2021/06/16 10:00:28 fetching corpus: 2043, signal 114749/139699 (executing program) 2021/06/16 10:00:28 fetching corpus: 2093, signal 115613/140708 (executing program) 2021/06/16 10:00:28 fetching corpus: 2143, signal 116919/141911 (executing program) 2021/06/16 10:00:28 fetching corpus: 2193, signal 118067/142965 (executing program) 2021/06/16 10:00:28 fetching corpus: 2243, signal 119222/144075 (executing program) 2021/06/16 10:00:28 fetching corpus: 2293, signal 120469/145171 (executing program) 2021/06/16 10:00:28 fetching corpus: 2343, signal 121929/146353 (executing program) 2021/06/16 10:00:28 fetching corpus: 2393, signal 123695/147551 (executing program) 2021/06/16 10:00:28 fetching corpus: 2443, signal 124515/148357 (executing program) 2021/06/16 10:00:28 fetching corpus: 2493, signal 125728/149302 (executing program) 2021/06/16 10:00:28 fetching corpus: 2543, signal 126741/150101 (executing program) 2021/06/16 10:00:29 fetching corpus: 2593, signal 127547/150808 (executing program) 2021/06/16 10:00:29 fetching corpus: 2643, signal 128131/151428 (executing program) 2021/06/16 10:00:29 fetching corpus: 2693, signal 128758/152046 (executing program) 2021/06/16 10:00:29 fetching corpus: 2743, signal 129575/152728 (executing program) 2021/06/16 10:00:29 fetching corpus: 2793, signal 130205/153349 (executing program) 2021/06/16 10:00:29 fetching corpus: 2842, signal 131622/154166 (executing program) 2021/06/16 10:00:29 fetching corpus: 2892, signal 132298/154749 (executing program) 2021/06/16 10:00:29 fetching corpus: 2942, signal 133051/155316 (executing program) 2021/06/16 10:00:29 fetching corpus: 2992, signal 134060/155916 (executing program) 2021/06/16 10:00:29 fetching corpus: 3042, signal 134534/156368 (executing program) 2021/06/16 10:00:29 fetching corpus: 3092, signal 135128/156871 (executing program) 2021/06/16 10:00:29 fetching corpus: 3142, signal 135693/157353 (executing program) 2021/06/16 10:00:29 fetching corpus: 3192, signal 136313/157825 (executing program) 2021/06/16 10:00:29 fetching corpus: 3242, signal 137066/158312 (executing program) 2021/06/16 10:00:30 fetching corpus: 3291, signal 138451/158880 (executing program) 2021/06/16 10:00:30 fetching corpus: 3341, signal 138923/159289 (executing program) 2021/06/16 10:00:30 fetching corpus: 3391, signal 139712/159686 (executing program) 2021/06/16 10:00:30 fetching corpus: 3441, signal 140713/160135 (executing program) 2021/06/16 10:00:30 fetching corpus: 3490, signal 141307/160539 (executing program) 2021/06/16 10:00:30 fetching corpus: 3540, signal 141835/160857 (executing program) 2021/06/16 10:00:30 fetching corpus: 3590, signal 142467/161184 (executing program) 2021/06/16 10:00:30 fetching corpus: 3640, signal 143051/161487 (executing program) 2021/06/16 10:00:30 fetching corpus: 3690, signal 143589/161790 (executing program) 2021/06/16 10:00:30 fetching corpus: 3740, signal 144373/162094 (executing program) 2021/06/16 10:00:30 fetching corpus: 3790, signal 145128/162359 (executing program) 2021/06/16 10:00:30 fetching corpus: 3840, signal 145579/162607 (executing program) 2021/06/16 10:00:30 fetching corpus: 3889, signal 146729/162879 (executing program) 2021/06/16 10:00:30 fetching corpus: 3939, signal 147396/163066 (executing program) 2021/06/16 10:00:31 fetching corpus: 3989, signal 147811/163268 (executing program) 2021/06/16 10:00:31 fetching corpus: 4038, signal 148274/163415 (executing program) 2021/06/16 10:00:31 fetching corpus: 4087, signal 148866/163415 (executing program) 2021/06/16 10:00:31 fetching corpus: 4135, signal 149458/163415 (executing program) 2021/06/16 10:00:31 fetching corpus: 4184, signal 150051/163415 (executing program) 2021/06/16 10:00:31 fetching corpus: 4234, signal 150428/163415 (executing program) 2021/06/16 10:00:31 fetching corpus: 4284, signal 151026/163415 (executing program) 2021/06/16 10:00:31 fetching corpus: 4334, signal 151454/163415 (executing program) 2021/06/16 10:00:31 fetching corpus: 4384, signal 152080/163415 (executing program) 2021/06/16 10:00:31 fetching corpus: 4434, signal 152457/163415 (executing program) 2021/06/16 10:00:31 fetching corpus: 4484, signal 152815/163421 (executing program) 2021/06/16 10:00:31 fetching corpus: 4534, signal 153324/163423 (executing program) 2021/06/16 10:00:31 fetching corpus: 4584, signal 153670/163455 (executing program) 2021/06/16 10:00:31 fetching corpus: 4634, signal 154231/163467 (executing program) 2021/06/16 10:00:31 fetching corpus: 4684, signal 154836/163486 (executing program) 2021/06/16 10:00:31 fetching corpus: 4734, signal 155482/163486 (executing program) 2021/06/16 10:00:31 fetching corpus: 4782, signal 156003/163486 (executing program) 2021/06/16 10:00:32 fetching corpus: 4832, signal 156355/163486 (executing program) 2021/06/16 10:00:32 fetching corpus: 4881, signal 156775/163486 (executing program) 2021/06/16 10:00:32 fetching corpus: 4930, signal 157059/163499 (executing program) 2021/06/16 10:00:32 fetching corpus: 4980, signal 157433/163499 (executing program) 2021/06/16 10:00:32 fetching corpus: 5030, signal 157939/163499 (executing program) 2021/06/16 10:00:32 fetching corpus: 5080, signal 158387/163499 (executing program) 2021/06/16 10:00:32 fetching corpus: 5130, signal 159016/163499 (executing program) 2021/06/16 10:00:32 fetching corpus: 5180, signal 159676/163499 (executing program) 2021/06/16 10:00:32 fetching corpus: 5230, signal 160475/163499 (executing program) 2021/06/16 10:00:32 fetching corpus: 5279, signal 161080/163508 (executing program) 2021/06/16 10:00:32 fetching corpus: 5329, signal 161501/163508 (executing program) 2021/06/16 10:00:32 fetching corpus: 5377, signal 162083/163576 (executing program) 2021/06/16 10:00:32 fetching corpus: 5386, signal 162203/163576 (executing program) 2021/06/16 10:00:32 fetching corpus: 5386, signal 162203/163576 (executing program) 2021/06/16 10:00:34 starting 6 fuzzer processes 10:00:34 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x2f}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x3c}, 0x0, @in=@broadcast}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 10:00:34 executing program 1: fsmount(0xffffffffffffffff, 0x0, 0x72) 10:00:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020101000470008000f80100200040000300000000000000800029842f98f153595a4b414c4c4552202046415431362020200e1fbe5b7cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a00", 0xc0}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8fffffff0ff056000ffffff09a0000bc0000de0000f000111200113400115600117800119f0ffff0f00"/96, 0x60, 0x1e0}, {&(0x7f0000010200)="f8fffffff0ff056000ffffff09a0000bc0000de0000f000111200113400115600117800119f0ffff0f00"/64, 0x40, 0x400}, {&(0x7f0000010300)="f8fffffff0ff056000ffffff09a0000bc0000de0000f000111200113400115600117800119f0ffff0f00"/64, 0x40, 0x600}, {&(0x7f0000010400)="f8fffffff0ff056000ffffff09a0000bc0000de0000f000111200113400115600117800119f0ffff0f00"/64, 0x40, 0x800}, {&(0x7f0000010500)="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", 0x120, 0xa00}, {&(0x7f0000010700)="2e202020202020202020201000b9ea70325132510000ea7032510300000000002e2e2020202020202020201000b9ea70325132510000ea70325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020202000b9ea70325132510000ea70325104001a040000", 0x80, 0x1a00}, {&(0x7f0000010800)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x1c00}, {&(0x7f0000010d00)='syzkallers\x00'/32, 0x20, 0x2200}, {&(0x7f0000010e00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x4800}], 0x0, &(0x7f0000010f00)) 10:00:34 executing program 2: set_mempolicy(0x1, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x2d}, {0x6}]}) 10:00:34 executing program 3: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x49804080, &(0x7f00000003c0), 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x22) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x1e) 10:00:34 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0e1dcc2025aa18c9228103b66e1d49d31d322dbecfa63da445b8bef5bd9125939f50bd2d4ed96a074eb04a348a666bf58b23ac4edcce412245deacb1f630e4052b9d6c20a45c772242f63a6bf41a08f4951d60a70381691f2ebc4d83bf4439283abaefe7f1e67ca2da5f00ae07779c9c606b0ed2b142bb754206eab9da94a3f57219e3c43edb17ae7c4d84ddeeddd", 0xf9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) syzkaller login: [ 27.316710][ T25] audit: type=1400 audit(1623837634.047:8): avc: denied { execmem } for pid=1762 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 27.413611][ T1767] cgroup: Unknown subsys name 'perf_event' [ 27.421682][ T1768] cgroup: Unknown subsys name 'perf_event' [ 27.431878][ T1767] cgroup: Unknown subsys name 'net_cls' [ 27.441516][ T1769] cgroup: Unknown subsys name 'perf_event' [ 27.441805][ T1768] cgroup: Unknown subsys name 'net_cls' [ 27.452975][ T1769] cgroup: Unknown subsys name 'net_cls' [ 27.455326][ T1771] cgroup: Unknown subsys name 'perf_event' [ 27.464884][ T1770] cgroup: Unknown subsys name 'perf_event' [ 27.465641][ T1771] cgroup: Unknown subsys name 'net_cls' [ 27.470913][ T1770] cgroup: Unknown subsys name 'net_cls' [ 27.478628][ T1774] cgroup: Unknown subsys name 'perf_event' [ 27.487907][ T1774] cgroup: Unknown subsys name 'net_cls' 10:00:38 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0e1dcc2025aa18c9228103b66e1d49d31d322dbecfa63da445b8bef5bd9125939f50bd2d4ed96a074eb04a348a666bf58b23ac4edcce412245deacb1f630e4052b9d6c20a45c772242f63a6bf41a08f4951d60a70381691f2ebc4d83bf4439283abaefe7f1e67ca2da5f00ae07779c9c606b0ed2b142bb754206eab9da94a3f57219e3c43edb17ae7c4d84ddeeddd", 0xf9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 31.570017][ T25] audit: type=1326 audit(1623837638.298:9): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=4477 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:00:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7c}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="4eab7b02009ae519c54d6b"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 10:00:38 executing program 1: fsmount(0xffffffffffffffff, 0x0, 0x72) 10:00:38 executing program 1: fsmount(0xffffffffffffffff, 0x0, 0x72) [ 31.644267][ T4510] loop5: detected capacity change from 0 to 128 10:00:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7c}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="4eab7b02009ae519c54d6b"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 10:00:38 executing program 2: set_mempolicy(0x1, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x2d}, {0x6}]}) [ 31.767833][ T25] audit: type=1326 audit(1623837638.498:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=4545 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:00:38 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x2f}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x3c}, 0x0, @in=@broadcast}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 10:00:38 executing program 3: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x49804080, &(0x7f00000003c0), 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x22) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x1e) 10:00:38 executing program 1: fsmount(0xffffffffffffffff, 0x0, 0x72) 10:00:38 executing program 2: set_mempolicy(0x1, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x2d}, {0x6}]}) 10:00:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7c}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="4eab7b02009ae519c54d6b"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 10:00:38 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x2f}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x3c}, 0x0, @in=@broadcast}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 31.868068][ T25] audit: type=1326 audit(1623837638.598:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=4568 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:00:41 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0e1dcc2025aa18c9228103b66e1d49d31d322dbecfa63da445b8bef5bd9125939f50bd2d4ed96a074eb04a348a666bf58b23ac4edcce412245deacb1f630e4052b9d6c20a45c772242f63a6bf41a08f4951d60a70381691f2ebc4d83bf4439283abaefe7f1e67ca2da5f00ae07779c9c606b0ed2b142bb754206eab9da94a3f57219e3c43edb17ae7c4d84ddeeddd", 0xf9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 10:00:41 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7c}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="4eab7b02009ae519c54d6b"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 10:00:41 executing program 3: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x49804080, &(0x7f00000003c0), 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x22) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x1e) 10:00:41 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x2f}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x3c}, 0x0, @in=@broadcast}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 10:00:41 executing program 2: set_mempolicy(0x1, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x2d}, {0x6}]}) 10:00:41 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x2f}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x3c}, 0x0, @in=@broadcast}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 10:00:41 executing program 5: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x49804080, &(0x7f00000003c0), 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x22) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x1e) [ 34.624112][ T25] audit: type=1326 audit(1623837641.359:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=4597 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:00:41 executing program 2: socket$inet6(0xa, 0x6, 0x0) 10:00:41 executing program 3: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x49804080, &(0x7f00000003c0), 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x22) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x1e) 10:00:41 executing program 5: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x49804080, &(0x7f00000003c0), 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x22) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x1e) [ 34.713041][ T25] audit: type=1400 audit(1623837641.449:13): avc: denied { create } for pid=4623 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 10:00:41 executing program 3: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0xfffffe58) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00') r1 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000000)=""/79, 0x4f) getdents64(r1, 0x0, 0x0) 10:00:41 executing program 2: socket$inet6(0xa, 0x6, 0x0) 10:00:44 executing program 5: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x49804080, &(0x7f00000003c0), 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x22) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x1e) 10:00:44 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0e1dcc2025aa18c9228103b66e1d49d31d322dbecfa63da445b8bef5bd9125939f50bd2d4ed96a074eb04a348a666bf58b23ac4edcce412245deacb1f630e4052b9d6c20a45c772242f63a6bf41a08f4951d60a70381691f2ebc4d83bf4439283abaefe7f1e67ca2da5f00ae07779c9c606b0ed2b142bb754206eab9da94a3f57219e3c43edb17ae7c4d84ddeeddd", 0xf9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 10:00:44 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x2f}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x3c}, 0x0, @in=@broadcast}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 10:00:44 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x2f}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x3c}, 0x0, @in=@broadcast}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 10:00:44 executing program 2: socket$inet6(0xa, 0x6, 0x0) 10:00:44 executing program 3: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0xfffffe58) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00') r1 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000000)=""/79, 0x4f) getdents64(r1, 0x0, 0x0) 10:00:44 executing program 2: socket$inet6(0xa, 0x6, 0x0) 10:00:44 executing program 5: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0xfffffe58) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00') r1 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000000)=""/79, 0x4f) getdents64(r1, 0x0, 0x0) 10:00:44 executing program 2: clock_settime(0x0, &(0x7f0000000000)) 10:00:44 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() syz_open_dev$tty1(0xc, 0x4, 0x1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = fork() tgkill(r1, r1, 0x9) sched_setattr(r1, &(0x7f00000000c0)={0x38, 0x6, 0x0, 0x401, 0x9, 0x40, 0x9, 0x4, 0x310, 0x6}, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) sched_setattr(r4, &(0x7f0000000140)={0x38, 0x0, 0x30, 0x80000000, 0x0, 0x7fff, 0x8, 0x80000000, 0x4, 0x3ff}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r5 = fork() tgkill(r5, r5, 0x9) sched_setattr(r5, &(0x7f0000000080)={0x38, 0x5, 0x7c, 0x7, 0x1f, 0x1282, 0x8, 0x0, 0xffff, 0x6}, 0x0) sync() 10:00:44 executing program 2: clock_settime(0x0, &(0x7f0000000000)) 10:00:44 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\\\x03+\x00E\xa1F\x91\xd2F/[\xaa\xa4\xd4s\xe8\xb1.\xdc\xe8xl<)\x16<\x17\xa1\xae\'\xc7_\x9do\xa2\xef\xb9\x82%\xf6\xb0e\x8e\t\xd3\xa4\x1e\xfe\x02&\x15\x17\xa1\xf9\x10\xe1\x03\x15\xe9\x1co\xf7T:\b\x15,\'\xc2\xe9\xc7.\xc9\x8c\x10\xcba|\xe4\xdbkw\nK\xc1\x05k\x85\xbe\x91\xdc&YS\xd9\fSy\xe6\x16\x9d\xe5\xbc,\xf2hh;\xc3\xbf,D8\xcc\xf7\xf2fkW\xdd\xde\x8d/\xba_2\x9f\x99\xa36\xb40`\x94\xbe\xdb|\xa0ons\xfb\x112\xa5\xbe{\x8b\xbd]\xb6\xad\x93:2\x1a*\xaeC\x93\x0e[+(\x96\xde^\xe2\xa4\xd4\xe2\xb9\x12\x17\xdc\r\xa4X8_@\xe5S6\x7f\x9b\xb2\r\x83<\xaf\xf2\x15\xccn\xd45f\xfe\xb0A8#\xb2\xb1\x1f\x06\x05\xff:F\xd4\xa1\x91A\x06\xf3{r\xb1I\xe3\x89\v\x0emj\x98\xd8\b+\xb7w\x9at7\x8cw\xe4\xe89\xf2VSfC\x9a\xd3:7I\x8a\xf6\xf0a+', 0x6) fcntl$lock(r0, 0x40a, 0x0) 10:00:44 executing program 2: clock_settime(0x0, &(0x7f0000000000)) [ 38.009541][ C0] hrtimer: interrupt took 22376 ns 10:00:47 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() syz_open_dev$tty1(0xc, 0x4, 0x1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = fork() tgkill(r1, r1, 0x9) sched_setattr(r1, &(0x7f00000000c0)={0x38, 0x6, 0x0, 0x401, 0x9, 0x40, 0x9, 0x4, 0x310, 0x6}, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) sched_setattr(r4, &(0x7f0000000140)={0x38, 0x0, 0x30, 0x80000000, 0x0, 0x7fff, 0x8, 0x80000000, 0x4, 0x3ff}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r5 = fork() tgkill(r5, r5, 0x9) sched_setattr(r5, &(0x7f0000000080)={0x38, 0x5, 0x7c, 0x7, 0x1f, 0x1282, 0x8, 0x0, 0xffff, 0x6}, 0x0) sync() 10:00:47 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\\\x03+\x00E\xa1F\x91\xd2F/[\xaa\xa4\xd4s\xe8\xb1.\xdc\xe8xl<)\x16<\x17\xa1\xae\'\xc7_\x9do\xa2\xef\xb9\x82%\xf6\xb0e\x8e\t\xd3\xa4\x1e\xfe\x02&\x15\x17\xa1\xf9\x10\xe1\x03\x15\xe9\x1co\xf7T:\b\x15,\'\xc2\xe9\xc7.\xc9\x8c\x10\xcba|\xe4\xdbkw\nK\xc1\x05k\x85\xbe\x91\xdc&YS\xd9\fSy\xe6\x16\x9d\xe5\xbc,\xf2hh;\xc3\xbf,D8\xcc\xf7\xf2fkW\xdd\xde\x8d/\xba_2\x9f\x99\xa36\xb40`\x94\xbe\xdb|\xa0ons\xfb\x112\xa5\xbe{\x8b\xbd]\xb6\xad\x93:2\x1a*\xaeC\x93\x0e[+(\x96\xde^\xe2\xa4\xd4\xe2\xb9\x12\x17\xdc\r\xa4X8_@\xe5S6\x7f\x9b\xb2\r\x83<\xaf\xf2\x15\xccn\xd45f\xfe\xb0A8#\xb2\xb1\x1f\x06\x05\xff:F\xd4\xa1\x91A\x06\xf3{r\xb1I\xe3\x89\v\x0emj\x98\xd8\b+\xb7w\x9at7\x8cw\xe4\xe89\xf2VSfC\x9a\xd3:7I\x8a\xf6\xf0a+', 0x6) fcntl$lock(r0, 0x40a, 0x0) 10:00:47 executing program 2: clock_settime(0x0, &(0x7f0000000000)) 10:00:47 executing program 3: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0xfffffe58) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00') r1 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000000)=""/79, 0x4f) getdents64(r1, 0x0, 0x0) 10:00:47 executing program 5: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0xfffffe58) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00') r1 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000000)=""/79, 0x4f) getdents64(r1, 0x0, 0x0) 10:00:47 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() syz_open_dev$tty1(0xc, 0x4, 0x1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = fork() tgkill(r1, r1, 0x9) sched_setattr(r1, &(0x7f00000000c0)={0x38, 0x6, 0x0, 0x401, 0x9, 0x40, 0x9, 0x4, 0x310, 0x6}, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) sched_setattr(r4, &(0x7f0000000140)={0x38, 0x0, 0x30, 0x80000000, 0x0, 0x7fff, 0x8, 0x80000000, 0x4, 0x3ff}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r5 = fork() tgkill(r5, r5, 0x9) sched_setattr(r5, &(0x7f0000000080)={0x38, 0x5, 0x7c, 0x7, 0x1f, 0x1282, 0x8, 0x0, 0xffff, 0x6}, 0x0) sync() 10:00:47 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() syz_open_dev$tty1(0xc, 0x4, 0x1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = fork() tgkill(r1, r1, 0x9) sched_setattr(r1, &(0x7f00000000c0)={0x38, 0x6, 0x0, 0x401, 0x9, 0x40, 0x9, 0x4, 0x310, 0x6}, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) sched_setattr(r4, &(0x7f0000000140)={0x38, 0x0, 0x30, 0x80000000, 0x0, 0x7fff, 0x8, 0x80000000, 0x4, 0x3ff}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r5 = fork() tgkill(r5, r5, 0x9) sched_setattr(r5, &(0x7f0000000080)={0x38, 0x5, 0x7c, 0x7, 0x1f, 0x1282, 0x8, 0x0, 0xffff, 0x6}, 0x0) sync() 10:00:47 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\\\x03+\x00E\xa1F\x91\xd2F/[\xaa\xa4\xd4s\xe8\xb1.\xdc\xe8xl<)\x16<\x17\xa1\xae\'\xc7_\x9do\xa2\xef\xb9\x82%\xf6\xb0e\x8e\t\xd3\xa4\x1e\xfe\x02&\x15\x17\xa1\xf9\x10\xe1\x03\x15\xe9\x1co\xf7T:\b\x15,\'\xc2\xe9\xc7.\xc9\x8c\x10\xcba|\xe4\xdbkw\nK\xc1\x05k\x85\xbe\x91\xdc&YS\xd9\fSy\xe6\x16\x9d\xe5\xbc,\xf2hh;\xc3\xbf,D8\xcc\xf7\xf2fkW\xdd\xde\x8d/\xba_2\x9f\x99\xa36\xb40`\x94\xbe\xdb|\xa0ons\xfb\x112\xa5\xbe{\x8b\xbd]\xb6\xad\x93:2\x1a*\xaeC\x93\x0e[+(\x96\xde^\xe2\xa4\xd4\xe2\xb9\x12\x17\xdc\r\xa4X8_@\xe5S6\x7f\x9b\xb2\r\x83<\xaf\xf2\x15\xccn\xd45f\xfe\xb0A8#\xb2\xb1\x1f\x06\x05\xff:F\xd4\xa1\x91A\x06\xf3{r\xb1I\xe3\x89\v\x0emj\x98\xd8\b+\xb7w\x9at7\x8cw\xe4\xe89\xf2VSfC\x9a\xd3:7I\x8a\xf6\xf0a+', 0x6) fcntl$lock(r0, 0x40a, 0x0) 10:00:47 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\\\x03+\x00E\xa1F\x91\xd2F/[\xaa\xa4\xd4s\xe8\xb1.\xdc\xe8xl<)\x16<\x17\xa1\xae\'\xc7_\x9do\xa2\xef\xb9\x82%\xf6\xb0e\x8e\t\xd3\xa4\x1e\xfe\x02&\x15\x17\xa1\xf9\x10\xe1\x03\x15\xe9\x1co\xf7T:\b\x15,\'\xc2\xe9\xc7.\xc9\x8c\x10\xcba|\xe4\xdbkw\nK\xc1\x05k\x85\xbe\x91\xdc&YS\xd9\fSy\xe6\x16\x9d\xe5\xbc,\xf2hh;\xc3\xbf,D8\xcc\xf7\xf2fkW\xdd\xde\x8d/\xba_2\x9f\x99\xa36\xb40`\x94\xbe\xdb|\xa0ons\xfb\x112\xa5\xbe{\x8b\xbd]\xb6\xad\x93:2\x1a*\xaeC\x93\x0e[+(\x96\xde^\xe2\xa4\xd4\xe2\xb9\x12\x17\xdc\r\xa4X8_@\xe5S6\x7f\x9b\xb2\r\x83<\xaf\xf2\x15\xccn\xd45f\xfe\xb0A8#\xb2\xb1\x1f\x06\x05\xff:F\xd4\xa1\x91A\x06\xf3{r\xb1I\xe3\x89\v\x0emj\x98\xd8\b+\xb7w\x9at7\x8cw\xe4\xe89\xf2VSfC\x9a\xd3:7I\x8a\xf6\xf0a+', 0x6) fcntl$lock(r0, 0x40a, 0x0) 10:00:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x280000e, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x55, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000040)) 10:00:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x280000e, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x55, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000040)) 10:00:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x280000e, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x55, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000040)) 10:00:48 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() syz_open_dev$tty1(0xc, 0x4, 0x1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = fork() tgkill(r1, r1, 0x9) sched_setattr(r1, &(0x7f00000000c0)={0x38, 0x6, 0x0, 0x401, 0x9, 0x40, 0x9, 0x4, 0x310, 0x6}, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) sched_setattr(r4, &(0x7f0000000140)={0x38, 0x0, 0x30, 0x80000000, 0x0, 0x7fff, 0x8, 0x80000000, 0x4, 0x3ff}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r5 = fork() tgkill(r5, r5, 0x9) sched_setattr(r5, &(0x7f0000000080)={0x38, 0x5, 0x7c, 0x7, 0x1f, 0x1282, 0x8, 0x0, 0xffff, 0x6}, 0x0) sync() 10:00:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x280000e, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x55, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000040)) 10:00:48 executing program 3: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0xfffffe58) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00') r1 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000000)=""/79, 0x4f) getdents64(r1, 0x0, 0x0) 10:00:48 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() syz_open_dev$tty1(0xc, 0x4, 0x1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = fork() tgkill(r1, r1, 0x9) sched_setattr(r1, &(0x7f00000000c0)={0x38, 0x6, 0x0, 0x401, 0x9, 0x40, 0x9, 0x4, 0x310, 0x6}, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) sched_setattr(r4, &(0x7f0000000140)={0x38, 0x0, 0x30, 0x80000000, 0x0, 0x7fff, 0x8, 0x80000000, 0x4, 0x3ff}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r5 = fork() tgkill(r5, r5, 0x9) sched_setattr(r5, &(0x7f0000000080)={0x38, 0x5, 0x7c, 0x7, 0x1f, 0x1282, 0x8, 0x0, 0xffff, 0x6}, 0x0) sync() 10:00:48 executing program 5: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0xfffffe58) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00') r1 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000000)=""/79, 0x4f) getdents64(r1, 0x0, 0x0) 10:00:48 executing program 1: r0 = socket(0x400000000010, 0x2, 0x0) recvmmsg(r0, &(0x7f0000006280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000001ac0)=0x90c, 0x4) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000b0000000000", 0x24) 10:00:48 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() syz_open_dev$tty1(0xc, 0x4, 0x1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = fork() tgkill(r1, r1, 0x9) sched_setattr(r1, &(0x7f00000000c0)={0x38, 0x6, 0x0, 0x401, 0x9, 0x40, 0x9, 0x4, 0x310, 0x6}, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) sched_setattr(r4, &(0x7f0000000140)={0x38, 0x0, 0x30, 0x80000000, 0x0, 0x7fff, 0x8, 0x80000000, 0x4, 0x3ff}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r5 = fork() tgkill(r5, r5, 0x9) sched_setattr(r5, &(0x7f0000000080)={0x38, 0x5, 0x7c, 0x7, 0x1f, 0x1282, 0x8, 0x0, 0xffff, 0x6}, 0x0) sync() 10:00:48 executing program 1: r0 = socket(0x400000000010, 0x2, 0x0) recvmmsg(r0, &(0x7f0000006280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000001ac0)=0x90c, 0x4) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000b0000000000", 0x24) 10:00:48 executing program 1: r0 = socket(0x400000000010, 0x2, 0x0) recvmmsg(r0, &(0x7f0000006280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000001ac0)=0x90c, 0x4) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000b0000000000", 0x24) 10:00:48 executing program 3: r0 = socket(0x400000000010, 0x2, 0x0) recvmmsg(r0, &(0x7f0000006280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000001ac0)=0x90c, 0x4) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000b0000000000", 0x24) 10:00:48 executing program 1: r0 = socket(0x400000000010, 0x2, 0x0) recvmmsg(r0, &(0x7f0000006280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000001ac0)=0x90c, 0x4) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000b0000000000", 0x24) 10:00:48 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000004ac0)=""/197, 0xc5}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='net/if_inet6\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x1200, 0x0) 10:00:49 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000004ac0)=""/197, 0xc5}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='net/if_inet6\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x1200, 0x0) 10:00:49 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() syz_open_dev$tty1(0xc, 0x4, 0x1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = fork() tgkill(r1, r1, 0x9) sched_setattr(r1, &(0x7f00000000c0)={0x38, 0x6, 0x0, 0x401, 0x9, 0x40, 0x9, 0x4, 0x310, 0x6}, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) sched_setattr(r4, &(0x7f0000000140)={0x38, 0x0, 0x30, 0x80000000, 0x0, 0x7fff, 0x8, 0x80000000, 0x4, 0x3ff}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r5 = fork() tgkill(r5, r5, 0x9) sched_setattr(r5, &(0x7f0000000080)={0x38, 0x5, 0x7c, 0x7, 0x1f, 0x1282, 0x8, 0x0, 0xffff, 0x6}, 0x0) sync() 10:00:49 executing program 3: r0 = socket(0x400000000010, 0x2, 0x0) recvmmsg(r0, &(0x7f0000006280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000001ac0)=0x90c, 0x4) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000b0000000000", 0x24) 10:00:49 executing program 1: r0 = syz_io_uring_setup(0x2de1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_STATX={0x15, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 10:00:49 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() syz_open_dev$tty1(0xc, 0x4, 0x1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = fork() tgkill(r1, r1, 0x9) sched_setattr(r1, &(0x7f00000000c0)={0x38, 0x6, 0x0, 0x401, 0x9, 0x40, 0x9, 0x4, 0x310, 0x6}, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) sched_setattr(r4, &(0x7f0000000140)={0x38, 0x0, 0x30, 0x80000000, 0x0, 0x7fff, 0x8, 0x80000000, 0x4, 0x3ff}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r5 = fork() tgkill(r5, r5, 0x9) sched_setattr(r5, &(0x7f0000000080)={0x38, 0x5, 0x7c, 0x7, 0x1f, 0x1282, 0x8, 0x0, 0xffff, 0x6}, 0x0) sync() 10:00:49 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() syz_open_dev$tty1(0xc, 0x4, 0x1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = fork() tgkill(r1, r1, 0x9) sched_setattr(r1, &(0x7f00000000c0)={0x38, 0x6, 0x0, 0x401, 0x9, 0x40, 0x9, 0x4, 0x310, 0x6}, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) sched_setattr(r4, &(0x7f0000000140)={0x38, 0x0, 0x30, 0x80000000, 0x0, 0x7fff, 0x8, 0x80000000, 0x4, 0x3ff}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r5 = fork() tgkill(r5, r5, 0x9) sched_setattr(r5, &(0x7f0000000080)={0x38, 0x5, 0x7c, 0x7, 0x1f, 0x1282, 0x8, 0x0, 0xffff, 0x6}, 0x0) sync() 10:00:49 executing program 1: r0 = syz_io_uring_setup(0x2de1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_STATX={0x15, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 10:00:49 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000004ac0)=""/197, 0xc5}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='net/if_inet6\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x1200, 0x0) 10:00:49 executing program 3: r0 = socket(0x400000000010, 0x2, 0x0) recvmmsg(r0, &(0x7f0000006280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000001ac0)=0x90c, 0x4) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000b0000000000", 0x24) 10:00:49 executing program 1: r0 = syz_io_uring_setup(0x2de1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_STATX={0x15, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 10:00:49 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000004ac0)=""/197, 0xc5}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='net/if_inet6\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x1200, 0x0) 10:00:49 executing program 1: r0 = syz_io_uring_setup(0x2de1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_STATX={0x15, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 10:00:49 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000005c0), 0x0, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x2283, &(0x7f0000001a80)) 10:00:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000080)=0x100000001, 0x4) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000240)=0x81, 0x4b) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f00000000c0)=0x81, 0x4) 10:00:50 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)={0x1, 0x0, 0x0, "11"}) 10:00:50 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x7e, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4141, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) fcntl$setlease(r0, 0x400, 0x24ce9b219ff54209) 10:00:50 executing program 3: set_mempolicy(0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='environ\x00') read$snapshot(r0, 0x0, 0x0) 10:00:50 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000005c0), 0x0, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x2283, &(0x7f0000001a80)) 10:00:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x200000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736616e0ca00088020000400000004f80000200040000300000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010100)='RRaA\x00'/32, 0x20, 0x800}, {&(0x7f0000010200)="00000000727241610100000007000000000000000000000000000000000055aa", 0x20, 0x9e0}, {&(0x7f0000010300)="601c6d6b646f736616e0ca00088020000400000004f80000200040000300000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60, 0x3000}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0f", 0x20, 0x10000}, {&(0x7f0000010500)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0f", 0x20, 0x10800}, {&(0x7f0000010600)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0f", 0x20, 0x11000}, {&(0x7f0000010700)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0f", 0x20, 0x11800}, {&(0x7f0000010800)="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", 0x120, 0x12000}, {&(0x7f0000010a00)="2e20202020202020202020100061ec70325132510000ec7032510300000000002e2e202020202020202020100061ec70325132510000ec70325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020200061ec70325132510000ec70325104001a040000", 0x80, 0x52000}, {&(0x7f0000010b00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x92000}, {&(0x7f0000011000)='syzkallers\x00'/32, 0x20, 0xd2000}, {&(0x7f0000011100)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x152000}], 0x0, &(0x7f0000011200)) 10:00:50 executing program 3: set_mempolicy(0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='environ\x00') read$snapshot(r0, 0x0, 0x0) 10:00:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000080)=0x100000001, 0x4) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000240)=0x81, 0x4b) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f00000000c0)=0x81, 0x4) 10:00:50 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000005c0), 0x0, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x2283, &(0x7f0000001a80)) [ 43.326152][ T4954] loop2: detected capacity change from 0 to 5408 10:00:50 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x7e, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4141, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) fcntl$setlease(r0, 0x400, 0x24ce9b219ff54209) 10:00:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000080)=0x100000001, 0x4) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000240)=0x81, 0x4b) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f00000000c0)=0x81, 0x4) 10:00:50 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)={0x1, 0x0, 0x0, "11"}) 10:00:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000080)=0x100000001, 0x4) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000240)=0x81, 0x4b) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f00000000c0)=0x81, 0x4) 10:00:50 executing program 3: set_mempolicy(0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='environ\x00') read$snapshot(r0, 0x0, 0x0) 10:00:50 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000005c0), 0x0, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x2283, &(0x7f0000001a80)) 10:00:50 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)={0x1, 0x0, 0x0, "11"}) 10:00:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000080)=0x100000001, 0x4) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000240)=0x81, 0x4b) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f00000000c0)=0x81, 0x4) 10:00:50 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x7e, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4141, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) fcntl$setlease(r0, 0x400, 0x24ce9b219ff54209) 10:00:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000080)=0x100000001, 0x4) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000240)=0x81, 0x4b) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f00000000c0)=0x81, 0x4) 10:00:50 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='environ\x00') read$snapshot(r0, 0x0, 0x0) 10:00:50 executing program 3: set_mempolicy(0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='environ\x00') read$snapshot(r0, 0x0, 0x0) 10:00:50 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)={0x1, 0x0, 0x0, "11"}) 10:00:50 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x7e, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4141, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) fcntl$setlease(r0, 0x400, 0x24ce9b219ff54209) 10:00:50 executing program 4: epoll_create(0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000000)=0x12) 10:00:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000080)=0x100000001, 0x4) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000240)=0x81, 0x4b) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f00000000c0)=0x81, 0x4) 10:00:50 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x108}]}, 0x10) r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/time_for_children\x00') dup2(r2, r1) sendmmsg(r0, &(0x7f0000006340)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000040)="c03e1abd", 0x33fe0}], 0x1}}], 0x1, 0x0) 10:00:50 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) getegid() 10:00:50 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='environ\x00') read$snapshot(r0, 0x0, 0x0) 10:00:50 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@empty}, {@in=@empty, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) 10:00:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$netlink(r0, &(0x7f00000002c0)=@unspec, 0xc) 10:00:50 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) getegid() 10:00:50 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x108}]}, 0x10) r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/time_for_children\x00') dup2(r2, r1) sendmmsg(r0, &(0x7f0000006340)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000040)="c03e1abd", 0x33fe0}], 0x1}}], 0x1, 0x0) 10:00:50 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='environ\x00') read$snapshot(r0, 0x0, 0x0) 10:00:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$netlink(r0, &(0x7f00000002c0)=@unspec, 0xc) 10:00:50 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x108}]}, 0x10) r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/time_for_children\x00') dup2(r2, r1) sendmmsg(r0, &(0x7f0000006340)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000040)="c03e1abd", 0x33fe0}], 0x1}}], 0x1, 0x0) 10:00:50 executing program 4: epoll_create(0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000000)=0x12) 10:00:50 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@empty}, {@in=@empty, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) 10:00:50 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) getegid() 10:00:50 executing program 5: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000300), 0x101a41, 0x0) 10:00:50 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x108}]}, 0x10) r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/time_for_children\x00') dup2(r2, r1) sendmmsg(r0, &(0x7f0000006340)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000040)="c03e1abd", 0x33fe0}], 0x1}}], 0x1, 0x0) 10:00:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$netlink(r0, &(0x7f00000002c0)=@unspec, 0xc) 10:00:50 executing program 5: epoll_create(0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000000)=0x12) 10:00:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$netlink(r0, &(0x7f00000002c0)=@unspec, 0xc) 10:00:50 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800002, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) read(r1, &(0x7f0000001480)=""/4096, 0x1000) 10:00:50 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@empty}, {@in=@empty, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) [ 43.903052][ T5083] ================================================================== [ 43.911151][ T5083] BUG: KCSAN: data-race in n_tty_receive_buf_common / n_tty_receive_char_special [ 43.920346][ T5083] [ 43.922654][ T5083] write to 0xffffc900001e9018 of 8 bytes by task 22 on cpu 0: [ 43.930093][ T5083] n_tty_receive_buf_common+0x1320/0x1e20 [ 43.935800][ T5083] n_tty_receive_buf2+0x2e/0x40 [ 43.940648][ T5083] tty_ldisc_receive_buf+0x5b/0xf0 [ 43.945747][ T5083] tty_port_default_receive_buf+0x54/0x80 [ 43.951467][ T5083] flush_to_ldisc+0x1c5/0x2c0 [ 43.956127][ T5083] process_one_work+0x3e9/0x8f0 [ 43.960962][ T5083] worker_thread+0x636/0xae0 [ 43.965571][ T5083] kthread+0x1d0/0x1f0 [ 43.969632][ T5083] ret_from_fork+0x1f/0x30 [ 43.974028][ T5083] [ 43.976333][ T5083] read to 0xffffc900001e9018 of 8 bytes by task 5083 on cpu 1: [ 43.983853][ T5083] n_tty_receive_char_special+0x328d/0x3ac0 [ 43.989728][ T5083] n_tty_receive_buf_common+0xe0c/0x1e20 [ 43.995340][ T5083] n_tty_receive_buf+0x2b/0x40 [ 44.000082][ T5083] tty_ioctl+0x968/0x1120 [ 44.004409][ T5083] __se_sys_ioctl+0xcb/0x140 [ 44.008997][ T5083] __x64_sys_ioctl+0x3f/0x50 [ 44.013567][ T5083] do_syscall_64+0x4a/0x90 [ 44.017974][ T5083] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 44.023848][ T5083] [ 44.026146][ T5083] value changed: 0x00000000000037b7 -> 0x00000000000037b9 [ 44.033223][ T5083] [ 44.035525][ T5083] Reported by Kernel Concurrency Sanitizer on: [ 44.041649][ T5083] CPU: 1 PID: 5083 Comm: syz-executor.4 Not tainted 5.13.0-rc6-syzkaller #0 10:00:50 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) getegid() 10:00:50 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fb1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b1", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={0x750, {}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x0, 0xffffffffffff2d28}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 44.050301][ T5083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 44.060334][ T5083] ================================================================== 10:00:51 executing program 4: epoll_create(0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000000)=0x12) 10:00:51 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@empty}, {@in=@empty, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) 10:00:51 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fb1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b1", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={0x750, {}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x0, 0xffffffffffff2d28}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 10:00:51 executing program 0: clone(0x4380, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000000016, &(0x7f0000000640)) ptrace(0x10, r0) rt_tgsigqueueinfo(r0, r0, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) waitid(0x0, 0x0, 0x0, 0x8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, &(0x7f00000002c0), 0x8, 0x0) 10:00:51 executing program 5: epoll_create(0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000000)=0x12) 10:00:51 executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000002c0)={0x7ff9}, 0x10) write(r0, &(0x7f0000000080)="240000001a005f0214f9f407000904001f000000fe020001000200000800040001000000", 0x24) 10:00:51 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fb1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b1", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={0x750, {}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x0, 0xffffffffffff2d28}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 44.355852][ T5130] ================================================================== [ 44.364066][ T5130] BUG: KCSAN: data-race in n_tty_receive_buf_common / n_tty_receive_char_special [ 44.373168][ T5130] [ 44.375481][ T5130] write to 0xffffc900002d1018 of 8 bytes by task 1778 on cpu 0: [ 44.383107][ T5130] n_tty_receive_buf_common+0x1320/0x1e20 [ 44.388817][ T5130] n_tty_receive_buf2+0x2e/0x40 [ 44.393663][ T5130] tty_ldisc_receive_buf+0x5b/0xf0 [ 44.398773][ T5130] tty_port_default_receive_buf+0x54/0x80 [ 44.404490][ T5130] flush_to_ldisc+0x1c5/0x2c0 [ 44.409180][ T5130] process_one_work+0x3e9/0x8f0 [ 44.414025][ T5130] worker_thread+0x636/0xae0 [ 44.418612][ T5130] kthread+0x1d0/0x1f0 [ 44.422677][ T5130] ret_from_fork+0x1f/0x30 [ 44.427083][ T5130] [ 44.429395][ T5130] read to 0xffffc900002d1018 of 8 bytes by task 5130 on cpu 1: [ 44.437018][ T5130] n_tty_receive_char_special+0x32db/0x3ac0 [ 44.442907][ T5130] n_tty_receive_buf_common+0xe0c/0x1e20 [ 44.448533][ T5130] n_tty_receive_buf+0x2b/0x40 [ 44.453284][ T5130] tty_ioctl+0x968/0x1120 [ 44.457727][ T5130] __se_sys_ioctl+0xcb/0x140 [ 44.462326][ T5130] __x64_sys_ioctl+0x3f/0x50 [ 44.466906][ T5130] do_syscall_64+0x4a/0x90 [ 44.471303][ T5130] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 44.477184][ T5130] [ 44.479492][ T5130] value changed: 0x0000000000002ffa -> 0x0000000000002ffc [ 44.486583][ T5130] [ 44.488883][ T5130] Reported by Kernel Concurrency Sanitizer on: [ 44.495023][ T5130] CPU: 1 PID: 5130 Comm: syz-executor.4 Not tainted 5.13.0-rc6-syzkaller #0 10:00:51 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fb1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b1", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={0x750, {}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x0, 0xffffffffffff2d28}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 44.503679][ T5130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 44.513714][ T5130] ================================================================== [ 44.521994][ T5130] ================================================================== [ 44.530079][ T5130] BUG: KCSAN: data-race in n_tty_receive_buf_common / n_tty_receive_char_special [ 44.539381][ T5130] [ 44.541727][ T5130] write to 0xffffc900002d1018 of 8 bytes by task 582 on cpu 0: [ 44.549256][ T5130] n_tty_receive_buf_common+0x1320/0x1e20 [ 44.554972][ T5130] n_tty_receive_buf2+0x2e/0x40 [ 44.559822][ T5130] tty_ldisc_receive_buf+0x5b/0xf0 [ 44.565024][ T5130] tty_port_default_receive_buf+0x54/0x80 [ 44.570740][ T5130] flush_to_ldisc+0x1c5/0x2c0 [ 44.575417][ T5130] process_one_work+0x3e9/0x8f0 [ 44.580357][ T5130] worker_thread+0x636/0xae0 [ 44.584937][ T5130] kthread+0x1d0/0x1f0 [ 44.589012][ T5130] ret_from_fork+0x1f/0x30 [ 44.593422][ T5130] [ 44.595734][ T5130] read to 0xffffc900002d1018 of 8 bytes by task 5130 on cpu 1: [ 44.603277][ T5130] n_tty_receive_char_special+0x3302/0x3ac0 [ 44.609284][ T5130] n_tty_receive_buf_common+0xe0c/0x1e20 [ 44.614896][ T5130] n_tty_receive_buf+0x2b/0x40 [ 44.619668][ T5130] tty_ioctl+0x968/0x1120 [ 44.623971][ T5130] __se_sys_ioctl+0xcb/0x140 [ 44.628626][ T5130] __x64_sys_ioctl+0x3f/0x50 [ 44.633203][ T5130] do_syscall_64+0x4a/0x90 [ 44.637615][ T5130] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 44.643605][ T5130] [ 44.645907][ T5130] value changed: 0x000000000001678e -> 0x00000000000167c8 [ 44.653023][ T5130] [ 44.655435][ T5130] Reported by Kernel Concurrency Sanitizer on: [ 44.661563][ T5130] CPU: 1 PID: 5130 Comm: syz-executor.4 Not tainted 5.13.0-rc6-syzkaller #0 [ 44.670320][ T5130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 44.680524][ T5130] ================================================================== 10:00:51 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800002, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) read(r1, &(0x7f0000001480)=""/4096, 0x1000) 10:00:51 executing program 2: unshare(0x600) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x10001) poll(&(0x7f0000000000)=[{r0, 0x1c8}, {r1}], 0x2, 0x0) 10:00:51 executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000002c0)={0x7ff9}, 0x10) write(r0, &(0x7f0000000080)="240000001a005f0214f9f407000904001f000000fe020001000200000800040001000000", 0x24) 10:00:51 executing program 0: clone(0x4380, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000000016, &(0x7f0000000640)) ptrace(0x10, r0) rt_tgsigqueueinfo(r0, r0, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) waitid(0x0, 0x0, 0x0, 0x8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, &(0x7f00000002c0), 0x8, 0x0) 10:00:51 executing program 4: epoll_create(0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000000)=0x12) 10:00:51 executing program 2: unshare(0x600) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x10001) poll(&(0x7f0000000000)=[{r0, 0x1c8}, {r1}], 0x2, 0x0) 10:00:51 executing program 2: unshare(0x600) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x10001) poll(&(0x7f0000000000)=[{r0, 0x1c8}, {r1}], 0x2, 0x0) 10:00:51 executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000002c0)={0x7ff9}, 0x10) write(r0, &(0x7f0000000080)="240000001a005f0214f9f407000904001f000000fe020001000200000800040001000000", 0x24) 10:00:51 executing program 5: epoll_create(0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000000)=0x12) 10:00:51 executing program 2: unshare(0x600) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x10001) poll(&(0x7f0000000000)=[{r0, 0x1c8}, {r1}], 0x2, 0x0) 10:00:51 executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000002c0)={0x7ff9}, 0x10) write(r0, &(0x7f0000000080)="240000001a005f0214f9f407000904001f000000fe020001000200000800040001000000", 0x24) 10:00:51 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800002, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) read(r1, &(0x7f0000001480)=""/4096, 0x1000) 10:00:52 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800002, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) read(r1, &(0x7f0000001480)=""/4096, 0x1000) 10:00:52 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e21, @empty}, {0x2, 0x4e20, @rand_addr=0x64010102}, 0x2a4, 0x0, 0x0, 0x0, 0x1602, &(0x7f0000000180)='batadv_slave_0\x00', 0x7, 0x0, 0x5}) 10:00:52 executing program 2: r0 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$invalidate(0x15, r0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000240)={r0}, &(0x7f0000000280)={'enc=', 'raw', ' hash=', {'sha1-generic\x00'}}, 0x0, 0x0) 10:00:52 executing program 0: clone(0x4380, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000000016, &(0x7f0000000640)) ptrace(0x10, r0) rt_tgsigqueueinfo(r0, r0, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) waitid(0x0, 0x0, 0x0, 0x8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, &(0x7f00000002c0), 0x8, 0x0) 10:00:52 executing program 5: set_mempolicy(0x3, &(0x7f0000000000)=0x5, 0x6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x6bf8df0d919e2693, 0x0) 10:00:52 executing program 1: unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000040)=[{0x3, 0x9, 0x1000}], 0x1) unshare(0x60000) 10:00:52 executing program 2: r0 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$invalidate(0x15, r0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000240)={r0}, &(0x7f0000000280)={'enc=', 'raw', ' hash=', {'sha1-generic\x00'}}, 0x0, 0x0) 10:00:52 executing program 1: unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000040)=[{0x3, 0x9, 0x1000}], 0x1) unshare(0x60000) 10:00:52 executing program 5: set_mempolicy(0x3, &(0x7f0000000000)=0x5, 0x6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x6bf8df0d919e2693, 0x0) 10:00:52 executing program 2: r0 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$invalidate(0x15, r0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000240)={r0}, &(0x7f0000000280)={'enc=', 'raw', ' hash=', {'sha1-generic\x00'}}, 0x0, 0x0) 10:00:52 executing program 2: r0 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$invalidate(0x15, r0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000240)={r0}, &(0x7f0000000280)={'enc=', 'raw', ' hash=', {'sha1-generic\x00'}}, 0x0, 0x0) 10:00:52 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800002, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) read(r1, &(0x7f0000001480)=""/4096, 0x1000) 10:00:53 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800002, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) read(r1, &(0x7f0000001480)=""/4096, 0x1000) 10:00:53 executing program 1: unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000040)=[{0x3, 0x9, 0x1000}], 0x1) unshare(0x60000) 10:00:53 executing program 2: r0 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$invalidate(0x15, r0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000240)={r0}, &(0x7f0000000280)={'enc=', 'raw', ' hash=', {'sha1-generic\x00'}}, 0x0, 0x0) 10:00:53 executing program 5: set_mempolicy(0x3, &(0x7f0000000000)=0x5, 0x6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x6bf8df0d919e2693, 0x0) 10:00:53 executing program 0: clone(0x4380, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000000016, &(0x7f0000000640)) ptrace(0x10, r0) rt_tgsigqueueinfo(r0, r0, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) waitid(0x0, 0x0, 0x0, 0x8, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, &(0x7f00000002c0), 0x8, 0x0) 10:00:53 executing program 2: r0 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$invalidate(0x15, r0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000240)={r0}, &(0x7f0000000280)={'enc=', 'raw', ' hash=', {'sha1-generic\x00'}}, 0x0, 0x0) 10:00:53 executing program 5: set_mempolicy(0x3, &(0x7f0000000000)=0x5, 0x6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x6bf8df0d919e2693, 0x0) 10:00:53 executing program 2: r0 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$invalidate(0x15, r0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000240)={r0}, &(0x7f0000000280)={'enc=', 'raw', ' hash=', {'sha1-generic\x00'}}, 0x0, 0x0) 10:00:53 executing program 1: unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000040)=[{0x3, 0x9, 0x1000}], 0x1) unshare(0x60000) 10:00:53 executing program 2: futex(0x0, 0x186, 0x0, 0xfffffffffffffffe, 0x0, 0x0) 10:00:53 executing program 2: futex(0x0, 0x186, 0x0, 0xfffffffffffffffe, 0x0, 0x0) 10:00:53 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800002, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) read(r1, &(0x7f0000001480)=""/4096, 0x1000) 10:00:54 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5424, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 10:00:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x1c, 0x10, 0x701, 0x0, 0x0, {0xa}, [@typed={0x6, 0x1, 0x0, 0x0, @str='_\xc6'}]}, 0x1c}}, 0x0) 10:00:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) personality(0x0) 10:00:54 executing program 2: futex(0x0, 0x186, 0x0, 0xfffffffffffffffe, 0x0, 0x0) 10:00:54 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) write$tcp_mem(r0, 0x0, 0x10) 10:00:54 executing program 2: futex(0x0, 0x186, 0x0, 0xfffffffffffffffe, 0x0, 0x0) 10:00:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x1c, 0x10, 0x701, 0x0, 0x0, {0xa}, [@typed={0x6, 0x1, 0x0, 0x0, @str='_\xc6'}]}, 0x1c}}, 0x0) 10:00:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) personality(0x0) 10:00:54 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) write$tcp_mem(r0, 0x0, 0x10) 10:00:54 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5424, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 10:00:54 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) lseek(r0, 0x0, 0x1) 10:00:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x1c, 0x10, 0x701, 0x0, 0x0, {0xa}, [@typed={0x6, 0x1, 0x0, 0x0, @str='_\xc6'}]}, 0x1c}}, 0x0) 10:00:54 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5424, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 10:00:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) personality(0x0) 10:00:54 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) write$tcp_mem(r0, 0x0, 0x10) 10:00:54 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) lseek(r0, 0x0, 0x1) 10:00:54 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f00000000c0)=[{0x0, 0x0, 0xc9de}, {&(0x7f0000000180)="051aae42b3eaf1a7b083997f55cc2ff8", 0x10, 0x6}], 0x0, &(0x7f0000000700)) 10:00:54 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) lseek(r0, 0x0, 0x1) 10:00:54 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5424, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 10:00:54 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) write$tcp_mem(r0, 0x0, 0x10) 10:00:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) personality(0x0) 10:00:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x1c, 0x10, 0x701, 0x0, 0x0, {0xa}, [@typed={0x6, 0x1, 0x0, 0x0, @str='_\xc6'}]}, 0x1c}}, 0x0) 10:00:54 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) lseek(r0, 0x0, 0x1) 10:00:54 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockname$netlink(r0, 0x0, 0x0) [ 47.768757][ T5362] loop4: detected capacity change from 0 to 201 [ 47.791926][ T5362] FAT-fs (loop4): bogus logical sector size 61930 [ 47.798383][ T5362] FAT-fs (loop4): Can't find a valid FAT filesystem 10:00:54 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000400)={r4, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r4, 0x3, 0x6, @random="c999eab20f9b"}, 0x10) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000400)={r6, 0x3, 0x6, @dev}, 0x10) dup2(r0, r1) 10:00:54 executing program 0: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000140)=""/239) 10:00:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x53, 0x2}, @ramp}) r1 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x822b01) write$char_usb(r1, &(0x7f0000000040)="e2", 0x570) 10:00:54 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000001c0), 0x0, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 47.840983][ T5362] loop4: detected capacity change from 0 to 201 [ 47.847670][ T5362] FAT-fs (loop4): bogus logical sector size 61930 [ 47.854127][ T5362] FAT-fs (loop4): Can't find a valid FAT filesystem 10:00:54 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f00000000c0)=[{0x0, 0x0, 0xc9de}, {&(0x7f0000000180)="051aae42b3eaf1a7b083997f55cc2ff8", 0x10, 0x6}], 0x0, &(0x7f0000000700)) 10:00:54 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000300)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$join(0x1, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0x6, r1, 0x0, 0x0, 0xfffffffffffffffc) 10:00:54 executing program 0: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000140)=""/239) 10:00:54 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000300)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$join(0x1, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0x6, r1, 0x0, 0x0, 0xfffffffffffffffc) 10:00:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x53, 0x2}, @ramp}) r1 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x822b01) write$char_usb(r1, &(0x7f0000000040)="e2", 0x570) [ 47.890339][ T5390] device lo entered promiscuous mode [ 47.919741][ T5386] device lo left promiscuous mode [ 47.932944][ T5405] device lo entered promiscuous mode 10:00:54 executing program 0: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000140)=""/239) 10:00:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x53, 0x2}, @ramp}) r1 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x822b01) write$char_usb(r1, &(0x7f0000000040)="e2", 0x570) 10:00:54 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000300)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$join(0x1, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0x6, r1, 0x0, 0x0, 0xfffffffffffffffc) [ 47.948687][ T5386] device lo left promiscuous mode [ 47.959704][ T5411] loop4: detected capacity change from 0 to 201 10:00:54 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000400)={r4, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r4, 0x3, 0x6, @random="c999eab20f9b"}, 0x10) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000400)={r6, 0x3, 0x6, @dev}, 0x10) dup2(r0, r1) 10:00:54 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000001c0), 0x0, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 10:00:54 executing program 0: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000140)=""/239) 10:00:54 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000300)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$join(0x1, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0x6, r1, 0x0, 0x0, 0xfffffffffffffffc) [ 47.998223][ T5411] FAT-fs (loop4): bogus logical sector size 61930 [ 48.004722][ T5411] FAT-fs (loop4): Can't find a valid FAT filesystem 10:00:54 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f00000000c0)=[{0x0, 0x0, 0xc9de}, {&(0x7f0000000180)="051aae42b3eaf1a7b083997f55cc2ff8", 0x10, 0x6}], 0x0, &(0x7f0000000700)) 10:00:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x53, 0x2}, @ramp}) r1 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x822b01) write$char_usb(r1, &(0x7f0000000040)="e2", 0x570) 10:00:54 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000001c0), 0x0, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 48.047809][ T5432] device lo entered promiscuous mode [ 48.067191][ T5429] device lo left promiscuous mode 10:00:54 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000400)={r4, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r4, 0x3, 0x6, @random="c999eab20f9b"}, 0x10) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000400)={r6, 0x3, 0x6, @dev}, 0x10) dup2(r0, r1) 10:00:54 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000400)={r4, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r4, 0x3, 0x6, @random="c999eab20f9b"}, 0x10) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000400)={r6, 0x3, 0x6, @dev}, 0x10) dup2(r0, r1) 10:00:54 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000400)={r4, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r4, 0x3, 0x6, @random="c999eab20f9b"}, 0x10) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000400)={r6, 0x3, 0x6, @dev}, 0x10) dup2(r0, r1) [ 48.115206][ T5444] loop4: detected capacity change from 0 to 201 [ 48.146398][ T5455] device lo entered promiscuous mode [ 48.156777][ T5452] device lo left promiscuous mode 10:00:54 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000300)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$join(0x1, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0x6, r1, 0x0, 0x0, 0xfffffffffffffffc) 10:00:54 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000001c0), 0x0, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 10:00:54 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000400)={r4, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r4, 0x3, 0x6, @random="c999eab20f9b"}, 0x10) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000400)={r6, 0x3, 0x6, @dev}, 0x10) dup2(r0, r1) 10:00:54 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000400)={r4, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r4, 0x3, 0x6, @random="c999eab20f9b"}, 0x10) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000400)={r6, 0x3, 0x6, @dev}, 0x10) dup2(r0, r1) [ 48.158932][ T5444] FAT-fs (loop4): bogus logical sector size 61930 [ 48.165780][ T5457] device lo entered promiscuous mode [ 48.168250][ T5444] FAT-fs (loop4): Can't find a valid FAT filesystem [ 48.181708][ T5462] device lo entered promiscuous mode [ 48.201083][ T5454] device lo left promiscuous mode 10:00:54 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000300)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$join(0x1, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0x6, r1, 0x0, 0x0, 0xfffffffffffffffc) 10:00:54 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f00000000c0)=[{0x0, 0x0, 0xc9de}, {&(0x7f0000000180)="051aae42b3eaf1a7b083997f55cc2ff8", 0x10, 0x6}], 0x0, &(0x7f0000000700)) [ 48.223658][ T5453] device lo left promiscuous mode 10:00:55 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000400)={r4, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r4, 0x3, 0x6, @random="c999eab20f9b"}, 0x10) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000400)={r6, 0x3, 0x6, @dev}, 0x10) dup2(r0, r1) 10:00:55 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000002cc0)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000001c40)="97b5001da816", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(r0, 0x2285, &(0x7f0000003280)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000003100)="f4684bebc3bb", 0x0, 0x0, 0x0, 0x0, 0x0}) 10:00:55 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000300)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$join(0x1, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0x6, r1, 0x0, 0x0, 0xfffffffffffffffc) [ 48.268856][ T5478] device lo entered promiscuous mode [ 48.274948][ T5479] device lo entered promiscuous mode [ 48.293787][ T5470] device lo left promiscuous mode [ 48.306294][ T5487] device lo entered promiscuous mode [ 48.312018][ T5483] loop4: detected capacity change from 0 to 201 10:00:55 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000400)={r4, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r4, 0x3, 0x6, @random="c999eab20f9b"}, 0x10) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000400)={r6, 0x3, 0x6, @dev}, 0x10) dup2(r0, r1) 10:00:55 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000400)={r4, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r4, 0x3, 0x6, @random="c999eab20f9b"}, 0x10) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000400)={r6, 0x3, 0x6, @dev}, 0x10) dup2(r0, r1) 10:00:55 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000180)='./bus\x00', 0x1eb142, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ftruncate(r1, 0x2008001) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) [ 48.318547][ T5471] device lo left promiscuous mode [ 48.319432][ T5483] FAT-fs (loop4): bogus logical sector size 61930 [ 48.330071][ T5483] FAT-fs (loop4): Can't find a valid FAT filesystem [ 48.337102][ T5482] device lo left promiscuous mode [ 48.356977][ T5500] device lo entered promiscuous mode 10:00:55 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) [ 48.390966][ T5499] device lo left promiscuous mode 10:00:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x18b, &(0x7f0000000400)="c4c691019919da078a0098d1e0a59320ff79b040f762910016775a8454cc16dc38f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689bce0e2db60713a3a7eeba5c9c6a47312334c2a97a4837714569255344e22045dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1fa2c43a2316418ba9eb1f8fac5771967650c7016af47d3160960f4dc0f5e233b32d191e7e4038ed607016ac06e8214ed7d77cea361915907969ff9f43a5aba17ec18f82611bd8eaa876fcc5ff9eac52567ecc1e30746c21060f7aeee1160a26ea18d388ae82180105572516041514566de0d50c3f8c39388cc5b3aab2edc6a689726ebf8cd9e266aea34caaa895f92c6985ccb99c7996d5c6334b075715b7ecead8479fc576101a7b896cb54e7b687e4d9cb370c233892e96ec3a068e0a589f46c0906c7b6c28c3ebeea0184794dbb21556b09ad245ea4786473c31a4846dc1d552fa551dc10149dc57a09cefd176757dc8d79f54d8d"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 10:00:55 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_SIOCDARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @loopback}, {0x0, @dev}, 0x78, {0x2, 0x0, @private}}) [ 48.412298][ T5509] device lo entered promiscuous mode 10:00:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004000000c0b80f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x801, 0x1001}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x518302, 0x0) pwritev(r0, &(0x7f00000006c0)=[{&(0x7f0000000780)="c3", 0x47ffffe}], 0x1, 0x400fa7f, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)) 10:00:55 executing program 0: pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x2}, 0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={[0x1]}, 0x8}) 10:00:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x18b, &(0x7f0000000400)="c4c691019919da078a0098d1e0a59320ff79b040f762910016775a8454cc16dc38f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689bce0e2db60713a3a7eeba5c9c6a47312334c2a97a4837714569255344e22045dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1fa2c43a2316418ba9eb1f8fac5771967650c7016af47d3160960f4dc0f5e233b32d191e7e4038ed607016ac06e8214ed7d77cea361915907969ff9f43a5aba17ec18f82611bd8eaa876fcc5ff9eac52567ecc1e30746c21060f7aeee1160a26ea18d388ae82180105572516041514566de0d50c3f8c39388cc5b3aab2edc6a689726ebf8cd9e266aea34caaa895f92c6985ccb99c7996d5c6334b075715b7ecead8479fc576101a7b896cb54e7b687e4d9cb370c233892e96ec3a068e0a589f46c0906c7b6c28c3ebeea0184794dbb21556b09ad245ea4786473c31a4846dc1d552fa551dc10149dc57a09cefd176757dc8d79f54d8d"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) [ 48.439359][ T5503] device lo left promiscuous mode 10:00:55 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_SIOCDARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @loopback}, {0x0, @dev}, 0x78, {0x2, 0x0, @private}}) 10:00:55 executing program 2: set_mempolicy(0x4, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) [ 48.481472][ T5524] loop5: detected capacity change from 0 to 512 10:00:55 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_SIOCDARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @loopback}, {0x0, @dev}, 0x78, {0x2, 0x0, @private}}) 10:00:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x18b, &(0x7f0000000400)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 10:00:55 executing program 2: set_mempolicy(0x4, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) [ 48.552757][ T5524] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 10:00:55 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000180)='./bus\x00', 0x1eb142, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ftruncate(r1, 0x2008001) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) 10:00:55 executing program 0: set_mempolicy(0x4, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 10:00:55 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_SIOCDARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @loopback}, {0x0, @dev}, 0x78, {0x2, 0x0, @private}}) 10:00:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x18b, &(0x7f0000000400)="c4c691019919da078a0098d1e0a59320ff79b040f762910016775a8454cc16dc38f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689bce0e2db60713a3a7eeba5c9c6a47312334c2a97a4837714569255344e22045dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1fa2c43a2316418ba9eb1f8fac5771967650c7016af47d3160960f4dc0f5e233b32d191e7e4038ed607016ac06e8214ed7d77cea361915907969ff9f43a5aba17ec18f82611bd8eaa876fcc5ff9eac52567ecc1e30746c21060f7aeee1160a26ea18d388ae82180105572516041514566de0d50c3f8c39388cc5b3aab2edc6a689726ebf8cd9e266aea34caaa895f92c6985ccb99c7996d5c6334b075715b7ecead8479fc576101a7b896cb54e7b687e4d9cb370c233892e96ec3a068e0a589f46c0906c7b6c28c3ebeea0184794dbb21556b09ad245ea4786473c31a4846dc1d552fa551dc10149dc57a09cefd176757dc8d79f54d8d"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 10:00:55 executing program 0: set_mempolicy(0x4, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 10:00:55 executing program 2: set_mempolicy(0x4, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 10:00:55 executing program 4: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x500, 0x0) 10:00:55 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000040)=[{&(0x7f0000001bc0)="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", 0x878}], 0x1) 10:00:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004000000c0b80f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x801, 0x1001}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x518302, 0x0) pwritev(r0, &(0x7f00000006c0)=[{&(0x7f0000000780)="c3", 0x47ffffe}], 0x1, 0x400fa7f, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)) 10:00:55 executing program 2: set_mempolicy(0x4, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 10:00:55 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000180)='./bus\x00', 0x1eb142, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ftruncate(r1, 0x2008001) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) 10:00:55 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000040)=[{&(0x7f0000001bc0)="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", 0x878}], 0x1) 10:00:55 executing program 0: set_mempolicy(0x4, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 10:00:55 executing program 4: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x500, 0x0) 10:00:55 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0x106}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:00:55 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000040)=[{&(0x7f0000001bc0)="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", 0x878}], 0x1) 10:00:55 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)=""/219, 0xdb) [ 48.965959][ T5594] loop5: detected capacity change from 0 to 512 [ 48.995084][ T5594] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 10:00:55 executing program 4: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x500, 0x0) 10:00:55 executing program 4: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x500, 0x0) 10:00:55 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="66530700ae897094e7b126b097eaa769be6d28c41bd34e677d114b655ef5f0166391c68f72bfc92b5579c65d37237647e947e4df73950000bb3987b1e8000000a6782112cf3239a12460e0838dda183f53ebc02044ab6ccd43716bac1d9a16e4ae5d7c636f204619ff703b01f59cd5c3b3759f79c3fe894be18c286db874cdb98f30b1a585dd390a03394e88cf7de9b10ad3fc1fc0af7195de09b35f15cb9a623983d70b3e6479ef8750e43654794aec08e794873430c1825403cd6a0013fe20bd91ad3acc366a08a57a6a56fe595942c558c968a80c93681140b95796e6c9755782704022af8eb9b724b108a8987bd4482f7180e2bb0ef38cde213f9983a9ac96ffa0869bbe", 0x106}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:00:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004000000c0b80f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x801, 0x1001}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x518302, 0x0) pwritev(r0, &(0x7f00000006c0)=[{&(0x7f0000000780)="c3", 0x47ffffe}], 0x1, 0x400fa7f, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)) 10:00:56 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)=""/219, 0xdb) 10:00:56 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000040)=[{&(0x7f0000001bc0)="75509b98834f2d5510ac05ca15bfb39084801e6f675e647b31976990ff7d4f0081d39cb2702f36b62484c2a5d4d4a218b86495ae54181488bb8eab8e83db1472e7c20299bdb651f4762260539a7710b6cef4c56761fd16b3bad7b8896accca622c6ffbaae7c4ed80a90b5273714f3ed81082f7ff8e3b6da4260c5cb9097bfe2729c8db9cb69ee0f8e5319b869198271be8c661aebabe93ce8986be2324df4b47e052ada3738c4932d1017ad35242f7078911959525df62b6f4dfbf58e0478e2524cedd0dda6f07c39902d95e4599042578411de8b366e3eb4cc70015634a3b338934b7c53656bf7c8a62161db31781f9638097b731518150a087051838a5ca6ed084c406e16952f66048557fa7b87a6262571b4e1eeb8c88ed9f53a70aa134ed59662de25d73ac4bcb5344829f1f5eb9dcd473c214c6f36c7750c72b90eab4a696d91cb492daccbd67f84eda2e0f734f1c1facb218c8ff9524655948c010b69d703ba3945c1c50e34420d8debcbb1ee5b7669d421b27032131d59e0ccb35b44c6bc0213d277d0212973ac9026b373298492f86dc8725e3223cae758d269dc18ecaed99108414ff5ef8b0f4acf47f72b8bb2552bb8f044e777c3ac48b5871cf89600b704cd3f9bf30cbfe5441bc2b4946b96ec49c7cecd24313f5c2437597c5afbd3ee01cb903be71c7b93bd578eff63d46e76d783f7d14b5e67b3181bdbab951f79b0fdf2ef5cd54f8b338b347921f2395c0ecfd9101dce4461dd017daeceeb98cd03fc70174f99ee554b3094cbbf9e308f4b3cb68012990c033ad75f7b7f6076a5ba2e0a543960ef0de5037c43b3f4bccf90dbb9e663bfc5bafc0a210c4bae9a0b7b73001451d0f422a306e0773a13b1d8faa0af3c198817baeb1d85b0bbca0b854190e7251de27a5f47a72e06d4d6cb0006f75553b05bda143c84ddd7fa9195b4cc84492d91959449d021005365490829054fb0d9ac8ba35b1395f78bee29f27b7cf3a807c84f882cead35da964ae00b580aff88409ee53d27b85dbdbb52730e940a7b3b5ce4b874ae7c54db9cb2ae751eed9bda4dd248f785dd5fb4c436d690f38ae10489b0e5b7614e84c4b4c243628d3135be90acc134b80b18fbd5b744f173cec76c98c476e61f7c15b1df1266fbaab8f32de55f4566e66a175488ee8217c0baea22287db4f2d650608d78b159870212d33127933796f6f689dd8ea910d091ffee25f05d9c45b12e685b8b271c40bb05d61c8dce0aaf96d13a103c60faa14b71077d9f0c63d4bf3051f7bac598742c162ed565be55786c1f0b5d9514e346ccb5014f21f86db6f01df65d51cec63908fee10c916f3ebf9ee5c221bbd4c5cb2525b1175e7e0ddb0d8ff51a97a39a05c5faea61839db6cd20db796b8fe2b5a12c96317d8a52361f072a2395f0549ca3947092a11e7f2167ea3ca2f29c2b7d9b0e2f72afd9abcaf8eb31d1df277df1fbe2af19e553002c1f7beca6f5943d234ed3da042f7ec078bf88fac844451b70b2b6104ab33fdbd86ca963f1ac768ecfa5dbc672f7ec5627fea1bce3064ac5346a8538f96836dd632f24580e1b46caa8f596e141c8ff7b8ceaceaa3d1bfcb23fd1bc8e90f001d5a3b915c809554a45b3ec7f82074a152cb35f629f1ef6091f69ef5417da09a72fcd9682352809eec130f4160cbc716c74af33c9a4e3469ce0e0dc538753688b1d531c77922ebb173a6e7df138ff262aa1b269f00dec35c2f6f25576301872b0dffabb8ce6eb01d6375cee1fd46c3c3faa43aa4893bbe6b8fc92b610a2eb6d8247f479e85508a23f0aafe86cd8036cba78c4be69fa41d9472dad0df00a3d0d7793e17c314aaa90c1c6a5a8cb1c2f966a4b83facdb1c73d4075497b59d36244cd64fe9f78e6b88497b92a05bc314ba697f85086e8fd3e8e5f2503ee9376a0bfc9344dacdc0170a73d205528f4663d82181c95c47ea81dc2de8a2d3526cba0d175c0b044f6e6a613d341a3b29f83fb29b478bcc3362a79e867b1405da573b0ecaa5a929aca7af4a7e48c3629a93f3902875b22a3e7e3c2a0ba47493206ea3ee305a30ba52a528272f0adb071dc42ac44c62763044bdfeeb9e2347a2a83c7548df53550493a2a1d2896bd973dc77daeb87f14b4b9ecdedda5c76fab88054daad2fa9523b0ca54f050fb9c425f6b12f20d65f0fde497dfb259700543b7e64de595dcf93862a32c1cfdad0cf8d332a2219b8c846eef0c276441345bcc6aa3b67db2332118a4d5461c5620f61676118b50ec97048406ca9b7ca8d8335dbf764fd26a26b8603ac38bf0dbb9dcc1121e0526796b942c38deade198242e1c38d70e4b9083443c11b1259eb10001d901102bfb1e92ed80393ebf2beb2f44f359c3e9363b058de4652728d7f07637561c23176a9c43d1593457ad813e6d19f6bb61a3a770e0ea8b46fcf5fe096b633cdf1347b33d5f918ed94f676e7e252f7e6d006d32ae196ae178cd543538ff9521faad8a116ab9a995b3e859202748ffadec55a28655e84cab37ef14e7cb67f763c295c2bf1647aac9ec55ae9a8d31db7996e6bf7b7d2bb90c7577c59bca94df8335f0e6740f368e6228709062dff39f616f034b14d27b8640fbd5f7283b79914aeb3f0ff2bd5d76cc6137912dd553b2ad2718fdf8d3348b7e6c5bd23dbcb2881cc99879bb8de2ea77ca350464370867e9b11c5b129e0d4c105e83883ea35ec9d7e85406a4b6db063f09c27863df26497d33d47270c882908df820f643c2a55949b08b0e90ce335513cd6365b736157926ea93c3d734d0917e3536c854be5fc241eb229e26bf8c76af0aee19b8dd94989963abb31928fe10d585c0f57b42c0c9e21ef0fb96e726d52d17a3463c9ce93ff3c66e5d77bcc44c435f2edc0005b37e28562b8ea40db10af0921ab1b5a113b02a6aacd4a6c4ba524ff33ed7218b3ae24c55d8930341a48ebd5754657f7dff0e0906fc4573694587d79d538db9f89c8bdd29ecb20394e630402cd9b29cf0aa251a4f39e9e1ed52802797b528e228719612183a0a0a5ec33170154c0e2caec1f64002167d0f97871b4d", 0x878}], 0x1) 10:00:56 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x3, &(0x7f0000000040)=[{0x14, 0x0, 0x0, 0xfffffffd}, {0x25}, {0x6}]}) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:00:56 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000180)='./bus\x00', 0x1eb142, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ftruncate(r1, 0x2008001) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) 10:00:56 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)=""/219, 0xdb) 10:00:56 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) getpid() process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @control={0x5}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 49.361888][ T25] audit: type=1326 audit(1623837656.093:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5646 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:00:56 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)=""/219, 0xdb) 10:00:56 executing program 0: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$inet(0x2, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) tkill(r0, 0x2b) wait4(0x0, 0x0, 0x0, 0x0) [ 49.425267][ T5662] loop5: detected capacity change from 0 to 512 [ 49.452926][ T5662] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 10:00:56 executing program 0: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$inet(0x2, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) tkill(r0, 0x2b) wait4(0x0, 0x0, 0x0, 0x0) [ 49.558723][ T5691] EXT4-fs error (device loop5): ext4_validate_block_bitmap:399: comm syz-executor.5: bg 0: block 2: invalid block bitmap [ 49.571647][ T5691] EXT4-fs (loop5): Delayed block allocation failed for inode 17 at logical offset 32799 with max blocks 2048 with error 28 [ 49.584467][ T5691] EXT4-fs (loop5): This should not happen!! Data will be lost [ 49.584467][ T5691] [ 49.594116][ T5691] EXT4-fs (loop5): Total free blocks count 0 [ 49.600100][ T5691] EXT4-fs (loop5): Free/Dirty block details 10:00:56 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000266000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f00005af000/0x4000)=nil) mremap(&(0x7f00007b8000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000860000/0x1000)=nil) mremap(&(0x7f0000e3b000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000fe1000/0x4000)=nil) mremap(&(0x7f0000ae7000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000c66000/0x3000)=nil) r0 = epoll_create(0x4) mmap(&(0x7f0000859000/0x4000)=nil, 0x4000, 0x0, 0x100010, r0, 0x0) [ 49.605988][ T5691] EXT4-fs (loop5): free_blocks=0 [ 49.610998][ T5691] EXT4-fs (loop5): dirty_blocks=3389 [ 49.616272][ T5691] EXT4-fs (loop5): Block reservation details [ 49.622251][ T5691] EXT4-fs (loop5): i_reserved_data_blocks=3389 [ 49.638045][ T5662] EXT4-fs (loop5): Delayed block allocation failed for inode 17 at logical offset 34848 with max blocks 1340 with error 28 [ 49.650888][ T5662] EXT4-fs (loop5): This should not happen!! Data will be lost [ 49.650888][ T5662] [ 50.195417][ T25] audit: type=1326 audit(1623837656.923:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5646 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:00:58 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000266000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f00005af000/0x4000)=nil) mremap(&(0x7f00007b8000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000860000/0x1000)=nil) mremap(&(0x7f0000e3b000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000fe1000/0x4000)=nil) mremap(&(0x7f0000ae7000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000c66000/0x3000)=nil) r0 = epoll_create(0x4) mmap(&(0x7f0000859000/0x4000)=nil, 0x4000, 0x0, 0x100010, r0, 0x0) 10:00:58 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x3, &(0x7f0000000040)=[{0x14, 0x0, 0x0, 0xfffffffd}, {0x25}, {0x6}]}) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:00:58 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0x106}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:00:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004000000c0b80f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x801, 0x1001}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x518302, 0x0) pwritev(r0, &(0x7f00000006c0)=[{&(0x7f0000000780)="c3", 0x47ffffe}], 0x1, 0x400fa7f, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)) 10:00:58 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000266000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f00005af000/0x4000)=nil) mremap(&(0x7f00007b8000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000860000/0x1000)=nil) mremap(&(0x7f0000e3b000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000fe1000/0x4000)=nil) mremap(&(0x7f0000ae7000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000c66000/0x3000)=nil) r0 = epoll_create(0x4) mmap(&(0x7f0000859000/0x4000)=nil, 0x4000, 0x0, 0x100010, r0, 0x0) [ 52.143145][ T5715] loop5: detected capacity change from 0 to 512 [ 52.152164][ T5715] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 52.169651][ T25] audit: type=1326 audit(1623837658.903:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5712 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 10:00:58 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000266000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f00005af000/0x4000)=nil) mremap(&(0x7f00007b8000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000860000/0x1000)=nil) mremap(&(0x7f0000e3b000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000fe1000/0x4000)=nil) mremap(&(0x7f0000ae7000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000c66000/0x3000)=nil) r0 = epoll_create(0x4) mmap(&(0x7f0000859000/0x4000)=nil, 0x4000, 0x0, 0x100010, r0, 0x0) 10:00:58 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x16, 0x0, &(0x7f00000000c0)) [ 52.237836][ T5731] EXT4-fs error (device loop5): ext4_validate_block_bitmap:399: comm syz-executor.5: bg 0: block 2: invalid block bitmap [ 52.255555][ T5731] EXT4-fs (loop5): Delayed block allocation failed for inode 17 at logical offset 32799 with max blocks 2048 with error 28 [ 52.268386][ T5731] EXT4-fs (loop5): This should not happen!! Data will be lost [ 52.268386][ T5731] [ 52.278294][ T5731] EXT4-fs (loop5): Total free blocks count 0 [ 52.284314][ T5731] EXT4-fs (loop5): Free/Dirty block details [ 52.290221][ T5731] EXT4-fs (loop5): free_blocks=0 [ 52.295149][ T5731] EXT4-fs (loop5): dirty_blocks=3765 [ 52.300674][ T5731] EXT4-fs (loop5): Block reservation details [ 52.306660][ T5731] EXT4-fs (loop5): i_reserved_data_blocks=3765 [ 52.322064][ T5715] EXT4-fs (loop5): Delayed block allocation failed for inode 17 at logical offset 34848 with max blocks 1716 with error 28 [ 52.335037][ T5715] EXT4-fs (loop5): This should not happen!! Data will be lost [ 52.335037][ T5715] 10:00:59 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) getpid() process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @control={0x5}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:00:59 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x16, 0x0, &(0x7f00000000c0)) 10:00:59 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000300), 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000400)) 10:00:59 executing program 0: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$inet(0x2, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) tkill(r0, 0x2b) wait4(0x0, 0x0, 0x0, 0x0) 10:00:59 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000300), 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000400)) 10:00:59 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x16, 0x0, &(0x7f00000000c0))