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", 0x2000, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000002000), 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000004b00)={0x0, 0x0, 0x0}, 0x0) setuid(0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)='debugfs\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000002080)={0x0, 0x80, 0x0, 0x0, 0xf7, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xea, 0x4, @perf_bp={&(0x7f0000002040), 0x2}, 0x4001, 0x7ff, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r3 = dup2(r1, r0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) 09:38:16 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x0) 09:38:16 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_START(r0, &(0x7f00000001c0)={&(0x7f0000000040), 0xffffffffffffff99, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {}, ["", ""]}, 0x14}}, 0x0) 09:38:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$sock(r0, &(0x7f0000003300)=[{{&(0x7f0000000000)=@tipc=@name, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14}}, @timestamping={{0x14}}], 0x30}}], 0x1, 0x0) 09:38:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x0, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:16 executing program 0: prctl$PR_SET_PDEATHSIG(0x4, 0x4032) 09:38:16 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000002180), 0x8000205, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 09:38:17 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={&(0x7f0000000040)=ANY=[], 0x14}}, 0x0) 09:38:17 executing program 2: clock_getres(0x6026a08651d0aea1, 0x0) 09:38:17 executing program 1: shmget(0x0, 0x9000, 0xeff1524014d2dac6, &(0x7f0000ff6000/0x9000)=nil) 09:38:17 executing program 0: prctl$PR_SET_PDEATHSIG(0x17, 0x0) 09:38:17 executing program 3: r0 = getpid() r1 = syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x200}], 0xb00, &(0x7f00000000c0)=ANY=[]) timer_create(0x6, 0x0, 0x0) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000280)={0x14, 0x67, 0x1, {0x80}}, 0x14) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000b80)={0x0, 0x5, 0x80000001}) openat(r1, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) getpgrp(r0) gettid() tkill(0x0, 0x0) 09:38:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000000000)="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", 0x2000, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000002000), 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000004b00)={0x0, 0x0, 0x0}, 0x0) setuid(0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)='debugfs\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000002080)={0x0, 0x80, 0x0, 0x0, 0xf7, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xea, 0x4, @perf_bp={&(0x7f0000002040), 0x2}, 0x4001, 0x7ff, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r3 = dup2(r1, r0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) 09:38:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x0, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:17 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x81080, 0x0) 09:38:18 executing program 1: prctl$PR_SET_PDEATHSIG(0x28, 0x0) 09:38:18 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv2(r0, &(0x7f0000000640)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x0) 09:38:18 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000600)={0x0, 0x6}) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={0x0}, 0x10}, 0x0) 09:38:18 executing program 3: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x80031, 0xffffffffffffffff, 0x8000000) 09:38:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x0, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:18 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) fstat(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee01, r1, 0xee01) setresuid(0xee00, 0xee00, 0x0) 09:38:19 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000240)={{}, {0x1, 0x4}, [{0x2, 0x0, 0xee01}, {0x2, 0x0, 0xee00}, {}, {0x2, 0x1}, {0x2, 0x4, 0xee01}], {0x4, 0x2}}, 0x4c, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f00000002c0), 0x24, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000240)={{}, {}, [{0x2, 0x0, 0xee01}, {0x2, 0x0, 0xee00}, {}, {0x2, 0x1}, {0x2, 0x4, 0xee01}], {0x4, 0x2}, [], {0x10, 0x1}}, 0x4c, 0x0) 09:38:19 executing program 0: shmat(0x0, &(0x7f0000ffa000/0x1000)=nil, 0x5000) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) 09:38:19 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000000), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000200), r2) sendmsg$NLBL_UNLABEL_C_LIST(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0xb1d, 0x0, 0x0, {0x8}}, 0x14}}, 0x0) 09:38:19 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) 09:38:19 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x18, r1, 0x81f96d9fdadb6fb9, 0x0, 0x0, {0xf}, [@HEADER={0x4}]}, 0x18}}, 0x0) 09:38:19 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, 0x0, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:19 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000240)={{}, {0x1, 0x4}, [{0x2, 0x0, 0xee01}, {0x2, 0x0, 0xee00}, {}, {0x2, 0x1}, {0x2, 0x4, 0xee01}], {0x4, 0x2}, [], {0x10, 0x1}}, 0x4c, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000240)={{}, {0x1, 0x4}, [{0x2, 0x0, 0xee01}, {0x2, 0x0, 0xee00}, {}, {0x2, 0x1}, {0x2, 0x4, 0xee01}], {0x4, 0x2}, [], {0x10, 0x1}}, 0x4c, 0x0) 09:38:19 executing program 0: ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000040)={0x0, 'ip6erspan0\x00'}) shmat(0x0, &(0x7f0000ffa000/0x1000)=nil, 0x5000) r0 = shmget(0x1, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0xf000) 09:38:19 executing program 2: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) open(0x0, 0x0, 0x0) syz_open_dev$vcsa(0x0, 0x6, 0x8000) madvise(&(0x7f0000055000/0x3000)=nil, 0x3000, 0x64) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/scsi_mod', 0x422000, 0x144) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000180), 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000040)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000500)) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', 0x0, 0xfffffffffffffff9, 0x0, &(0x7f0000000280), 0x100800, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) 09:38:19 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x8406, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x1fffff, 0x1, 0x11, r0, 0x0) 09:38:20 executing program 1: getpid() r0 = syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x200}], 0xb00, &(0x7f00000000c0)=ANY=[]) timer_create(0x6, 0x0, 0x0) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000280)={0x14, 0x67, 0x1, {0x80}}, 0x14) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) openat(r0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) getpgrp(0x0) gettid() tkill(0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:38:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, 0x0, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:20 executing program 3: r0 = shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x7000) shmdt(r0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 09:38:20 executing program 0: io_uring_setup(0x6e6, &(0x7f0000000040)) [ 919.343475][T12816] loop2: detected capacity change from 0 to 264192 [ 919.359168][T12818] loop1: detected capacity change from 0 to 1 [ 919.417362][T12818] syz-executor.1: attempt to access beyond end of device [ 919.417362][T12818] loop1: rw=2048, want=8, limit=1 [ 919.430149][T12818] SQUASHFS error: Failed to read block 0x0: -5 [ 919.436512][T12818] unable to read squashfs_super_block 09:38:20 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f00000005c0)={&(0x7f00000004c0), 0x200004cc, &(0x7f0000000580)={&(0x7f0000000540)={0x14, 0x0, 0x0, 0x0, 0x0, {}, ["", "", ""]}, 0x14}}, 0x0) [ 919.667640][T12818] loop1: detected capacity change from 0 to 1 09:38:21 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, 0x0, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:21 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000000), r1) sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x54, r2, 0x11, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @local}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @local}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @dev}, @NLBL_UNLABEL_A_IFACE={0x0, 0x6, 'macsec0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0xfdc4}]}, 0x54}}, 0x0) [ 919.741068][T12818] syz-executor.1: attempt to access beyond end of device [ 919.741068][T12818] loop1: rw=2048, want=8, limit=1 [ 919.755230][T12818] SQUASHFS error: Failed to read block 0x0: -5 [ 919.761801][T12818] unable to read squashfs_super_block 09:38:21 executing program 1: pipe2(&(0x7f0000002280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$cgroup_netprio_ifpriomap(r0, 0x0, 0xfffffffffffffe5d) 09:38:21 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000080)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36]}}]}) 09:38:21 executing program 0: prctl$PR_SET_PDEATHSIG(0x18, 0x0) 09:38:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f00000027c0)={0x0, 0x0, 0x0}, 0x41) [ 920.271626][T12847] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 09:38:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000400)=@file={0x1, './file0\x00'}, 0x6e) 09:38:21 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480), 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:22 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB=',']) 09:38:22 executing program 1: sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x469137a4b83a3067) 09:38:22 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) open(0x0, 0x0, 0x0) syz_open_dev$vcsa(0x0, 0x6, 0x8000) madvise(&(0x7f0000055000/0x3000)=nil, 0x3000, 0x64) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/scsi_mod', 0x422000, 0x144) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000180), 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2, @in6=@empty}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', 0x0, 0x0, 0x0, &(0x7f0000000280), 0x100800, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) 09:38:22 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x11, 0x0, 0x0) 09:38:22 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@nr_blocks={'nr_blocks', 0x3d, [0x32]}}]}) 09:38:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480), 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:22 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x8406, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x1fffff, 0x1, 0x11, r0, 0x0) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x7000) 09:38:22 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000240)={{}, {}, [{0x2, 0x0, 0xee01}, {0x2, 0x0, 0xee00}, {}, {}]}, 0x44, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000240), 0x24, 0x0) 09:38:22 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', 0x0, 0x4c, 0x0) 09:38:23 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 09:38:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480), 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:23 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv2(r0, &(0x7f0000000640)=[{0x0, 0x700000000000000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) 09:38:23 executing program 1: shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x7000) 09:38:23 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x100, 0x0, 0x0) 09:38:23 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x5000}, 0x0) 09:38:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) 09:38:24 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) pselect6(0x40, &(0x7f0000000080)={0x8}, 0x0, 0x0, 0x0, 0x0) 09:38:24 executing program 1: r0 = fanotify_init(0x0, 0x0) fanotify_mark(r0, 0x61, 0x1010, 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') 09:38:24 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0x0) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:24 executing program 3: prctl$PR_SET_PDEATHSIG(0x1e, 0x0) 09:38:24 executing program 4: shmctl$SHM_LOCK(0x0, 0xc) 09:38:24 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$squashfs(&(0x7f0000000780), &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x80000, &(0x7f0000000c40)) 09:38:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername(r0, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000180)=0xffffff3f) 09:38:24 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0x0) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:25 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000000), r1) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x30, r2, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}]}, 0x30}}, 0x0) 09:38:25 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'trusted.', '\x00'}) 09:38:25 executing program 3: shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x6000) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x1fffff, 0x1, 0x11, r0, 0x0) 09:38:25 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) 09:38:25 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@random={'user.', '@\x00'}, 0x0, 0x0) 09:38:25 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x2}, 0xc, &(0x7f0000000580)={0x0}}, 0x0) 09:38:25 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0xe, 0x0, 0x0) 09:38:26 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0x0) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:26 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x10c) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000980)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312", 0x41, 0x5fd}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="696f636861727365743d64656661756c742c0092cbcd84586b86ce41100b317d6322b25e1033d22eb6ee72976b0231a0ed1494c35d611630b96b9c51b75d0a505ab0c8fd705729f4414f6d3d03ddc3d99ae6587f9832ebfaa078915346f6365b6cb279f7d6550cc689174d28cf8876f54d4c7502a1c3616c91d5d1fa5c4a31b11db7d324412cbb441b327f7cdecbee22ade47c0cb42d10640f414fc1049b929b4452c305a6e3622a01a49b8b6b7e3e1db5433664e4e987570a"]) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x8, 0x0, 0x3f, 0xff, 0x0, 0x0, 0x80, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000080), 0x1}, 0x8, 0x6, 0x7, 0x7, 0x3f, 0xf875, 0x9, 0x0, 0x0, 0x0, 0x438}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) bind$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e23}, 0x6e) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40042406, &(0x7f0000000940)='\'\x00') mkdirat(r1, &(0x7f0000000040)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0xc) kcmp(0x0, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendto(r3, &(0x7f0000000580)="9dea4ed29afb5ecb0a5c08a513bfe9dc1cd53b275508e5913e1501a7d6c9804d6a3596a7a51468b948427a34f74bed82595d783de145ced4d6975f9bbd24d28936f7cf7a733cdabb6ee8b6b67b38a1d6d610a24f9d6a079f55364869414f2813c5dfa4194e37af7c7c", 0x69, 0x24000000, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 09:38:26 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x74, 0x0]}}]}) 09:38:26 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/kexec_crash_loaded', 0x840, 0x0) 09:38:26 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x5460, 0x0) 09:38:26 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x800454cf, 0x0) 09:38:26 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x0) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:27 executing program 3: shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0xe000) 09:38:27 executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/kexec_crash_loaded', 0x4840, 0x0) 09:38:27 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x74, 0x0]}}]}) 09:38:27 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000000), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000000), r2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_LIST(r4, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) sendmsg$NLBL_UNLABEL_C_ACCEPT(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x54, r3, 0x11, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @local}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @local}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @dev={0xfe, 0x80, '\x00', 0x2b}}, @NLBL_UNLABEL_A_IFACE={0x0, 0x6, 'macsec0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0xfdc4}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x24004808) ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000180)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) splice(0xffffffffffffffff, &(0x7f00000001c0)=0x2d97, 0xffffffffffffffff, 0x0, 0xfffffffffffffffa, 0xf) 09:38:27 executing program 0: prctl$PR_SET_PDEATHSIG(0x7, 0x0) 09:38:27 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) open(0x0, 0x0, 0x0) syz_open_dev$vcsa(0x0, 0x6, 0x8000) madvise(&(0x7f0000055000/0x3000)=nil, 0x3000, 0x64) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000180), 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2, @in6=@empty}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000500)) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', 0x0, 0xfffffffffffffff9, 0x0, &(0x7f0000000280), 0x100800, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) 09:38:27 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={0x0, 0xfffffdef}}, 0x0) 09:38:27 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x0) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) [ 926.624561][T12989] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 926.720421][T12989] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 09:38:28 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x74, 0x0]}}]}) 09:38:28 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) open(0x0, 0x0, 0x0) syz_open_dev$vcsa(0x0, 0x6, 0x8000) madvise(&(0x7f0000055000/0x3000)=nil, 0x3000, 0x64) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/scsi_mod', 0x422000, 0x144) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000180), 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2, @in6=@empty}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000500)) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', 0x0, 0xfffffffffffffff9, 0x0, &(0x7f0000000280), 0x100800, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) 09:38:28 executing program 1: prctl$PR_SET_PDEATHSIG(0x19, 0x0) 09:38:28 executing program 4: openat$nvram(0xffffffffffffff9c, 0x0, 0x410900, 0x0) 09:38:28 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) open(0x0, 0x0, 0x0) syz_open_dev$vcsa(0x0, 0x6, 0x8000) madvise(&(0x7f0000055000/0x3000)=nil, 0x3000, 0x64) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000180), 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2, @in6=@empty}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000500)) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', 0x0, 0xfffffffffffffff9, 0x0, &(0x7f0000000280), 0x100800, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) 09:38:29 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x48, 0x0) 09:38:29 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x74, 0x0]}}]}) 09:38:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x0) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) [ 927.880061][T13013] loop0: detected capacity change from 0 to 264192 09:38:29 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000002180), 0x8000205, 0x1) fallocate(r0, 0x11, 0x2, 0x100007e00) 09:38:29 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) open(0x0, 0x0, 0x0) syz_open_dev$vcsa(0x0, 0x6, 0x8000) madvise(&(0x7f0000055000/0x3000)=nil, 0x3000, 0x64) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/scsi_mod', 0x422000, 0x144) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000180), 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2, @in6=@empty}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000500)) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', 0x0, 0xfffffffffffffff9, 0x0, &(0x7f0000000280), 0x100800, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) 09:38:29 executing program 2: syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x74, 0x0]}}]}) 09:38:29 executing program 1: shmat(0x0, &(0x7f0000ffa000/0x1000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x6000) shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) 09:38:29 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x7fffdf003000, 0x1, 0x11, r0, 0x0) 09:38:30 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) [ 928.825220][T13038] loop0: detected capacity change from 0 to 264192 09:38:30 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x300, 0x11, r0, 0x0) 09:38:30 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000002180), 0x8000205, 0x1) fallocate(r0, 0x11, 0x0, 0x100007e00) 09:38:30 executing program 2: syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x74, 0x0]}}]}) 09:38:30 executing program 1: sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x79e3d533d4d3ebff) 09:38:30 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000005c0)=@file={0x1, './file0\x00'}, 0x6e) 09:38:30 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 09:38:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:31 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$squashfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2822, &(0x7f0000000280)={[{}, {'smackfsdef'}]}) 09:38:31 executing program 2: syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x74, 0x0]}}]}) 09:38:31 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg$sock(r0, &(0x7f0000000f40)=[{{&(0x7f0000000080)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}}], 0x1, 0x0) 09:38:31 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x10c) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000980)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475ffa1d", 0x45, 0x5fd}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="696f636861727365743d64656661756c742c0092cbcd84586b86ce41100b317d6322b25e1033d22eb6ee72976b0231a0ed1494c35d611630b96b9c51b75d0a505ab0c8fd705729f4414f6d3d03ddc3d99ae6587f9832ebfaa078915346f6365b6cb279f7d6550cc689174d28cf8876f54d4c7502a1c3616c91d5d1fa5c4a31b11db7d324412cbb441b327f7cdecbee22ade47c0cb42d10640f414fc1049b929b4452c305a6e3622a01a49b8b6b7e3e1db5433664e4e987570a"]) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x8, 0x0, 0x3f, 0xff, 0x0, 0x3ff, 0x80, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000080), 0x1}, 0x8, 0x6, 0x7, 0x7, 0x3f, 0xf875, 0x9, 0x0, 0x0, 0x0, 0x438}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bind$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e23}, 0x6e) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40042406, &(0x7f0000000940)='\'\x00') mkdirat(r1, &(0x7f0000000040)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0xc) kcmp(0x0, r3, 0x3, 0xffffffffffffffff, r2) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendto(r4, &(0x7f0000000580)="9dea4ed29afb5ecb0a5c08a513bfe9dc1cd53b275508e5913e1501a7d6c9804d6a3596a7a51468b948427a34f74bed82595d783de145ced4d6975f9bbd24d28936f7cf7a733cdabb6ee8b6b67b38a1d6d610a24f9d6a079f55364869414f2813c5dfa4194e37af7c7c", 0x69, 0x24000000, &(0x7f0000000600)=@nfc={0x27, 0x1, 0x2, 0x6}, 0x80) socket$inet_udplite(0x2, 0x2, 0x88) 09:38:31 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000000), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_LIST(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 930.231212][T13075] tmpfs: Unknown parameter 'smackfsdef' 09:38:31 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv2(r0, &(0x7f0000000640)=[{0x0, 0x700000000000000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0xfffffec2}], 0x10000000000002ef, 0x0, 0x0, 0x0) 09:38:31 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x74, 0x0]}}]}) 09:38:31 executing program 1: openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000002080), 0x800, 0x0) 09:38:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:32 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) fchownat(r0, &(0x7f0000000140)='.\x00', 0x0, 0xee00, 0x1000) 09:38:32 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x10c) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000980)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475ffa1d", 0x45, 0x5fd}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="696f636861727365743d64656661756c742c0092cbcd84586b86ce41100b317d6322b25e1033d22eb6ee72976b0231a0ed1494c35d611630b96b9c51b75d0a505ab0c8fd705729f4414f6d3d03ddc3d99ae6587f9832ebfaa078915346f6365b6cb279f7d6550cc689174d28cf8876f54d4c7502a1c3616c91d5d1fa5c4a31b11db7d324412cbb441b327f7cdecbee22ade47c0cb42d10640f414fc1049b929b4452c305a6e3622a01a49b8b6b7e3e1db5433664e4e987570a"]) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x8, 0x0, 0x3f, 0xff, 0x0, 0x3ff, 0x80, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000080), 0x1}, 0x8, 0x6, 0x7, 0x7, 0x3f, 0xf875, 0x9, 0x0, 0x0, 0x0, 0x438}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bind$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e23}, 0x6e) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40042406, &(0x7f0000000940)='\'\x00') mkdirat(r1, &(0x7f0000000040)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0xc) kcmp(0x0, r3, 0x3, 0xffffffffffffffff, r2) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendto(r4, &(0x7f0000000580)="9dea4ed29afb5ecb0a5c08a513bfe9dc1cd53b275508e5913e1501a7d6c9804d6a3596a7a51468b948427a34f74bed82595d783de145ced4d6975f9bbd24d28936f7cf7a733cdabb6ee8b6b67b38a1d6d610a24f9d6a079f55364869414f2813c5dfa4194e37af7c7c", 0x69, 0x24000000, &(0x7f0000000600)=@nfc={0x27, 0x1, 0x2, 0x6}, 0x80) socket$inet_udplite(0x2, 0x2, 0x88) 09:38:32 executing program 4: socketpair(0x2, 0xa, 0x6, &(0x7f0000000040)) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) 09:38:32 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x74, 0x0]}}]}) 09:38:32 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)={[], [{@smackfsdef={'smackfsdef', 0x3d, 'huge=advise'}}]}) 09:38:32 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:32 executing program 0: r0 = shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x6000) shmdt(r0) shmdt(0x0) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) [ 931.625464][T13113] tmpfs: Unknown parameter 'smackfsdef' [ 931.656012][T13113] tmpfs: Unknown parameter 'smackfsdef' 09:38:33 executing program 4: fchmodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 09:38:33 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x74, 0x0]}}]}) 09:38:33 executing program 3: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 09:38:33 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv2(r0, &(0x7f0000000640)=[{&(0x7f0000000100)=""/187, 0xbb}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x13) 09:38:33 executing program 0: io_uring_setup(0x1957, &(0x7f0000000040)) 09:38:33 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:33 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000280), 0x0, 0x0, 0x1) 09:38:33 executing program 3: socketpair(0x0, 0x80c, 0x0, &(0x7f0000000100)) 09:38:33 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x74, 0x0]}}]}) 09:38:33 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv2(r0, &(0x7f0000000640)=[{&(0x7f0000000100)=""/187, 0xbb}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x13) 09:38:34 executing program 0: syz_mount_image$tmpfs(&(0x7f00000028c0), &(0x7f0000002900)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002e80)={[], [{@smackfsdef={'smackfsdef', 0x3d, 'kuchannel_timer_signo\x00'}}]}) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) 09:38:34 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000002c0)={0x1, &(0x7f0000000180)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000100)) 09:38:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002a00)=[{{0x0, 0x0, &(0x7f00000013c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="de", 0x1}], 0x3}}], 0x1, 0x0) 09:38:34 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv2(r0, &(0x7f0000000640)=[{&(0x7f0000000100)=""/187, 0xbb}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x13) 09:38:34 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:34 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x74, 0x0]}}]}) [ 933.281350][T13148] tmpfs: Unknown parameter 'smackfsdef' [ 933.325462][T13148] tmpfs: Unknown parameter 'smackfsdef' 09:38:34 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x803e0000}, 0x0) [ 933.390527][ T24] audit: type=1326 audit(1639129114.636:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13149 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=240 compat=1 ip=0xf6eea549 code=0x0 09:38:34 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv2(r0, &(0x7f0000000640)=[{&(0x7f0000000100)=""/187, 0xbb}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x13) 09:38:35 executing program 4: clone3(&(0x7f0000000800)={0x21c1000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:38:35 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x74, 0x0]}}]}) 09:38:35 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002a00)=[{{0x0, 0x0, &(0x7f00000013c0)=[{0x0}, {&(0x7f0000001340)='}', 0x1}, {&(0x7f0000000200)="de", 0x1}], 0x3}}], 0x1, 0x0) [ 934.184022][ T24] audit: type=1326 audit(1639129115.426:51): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13149 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=240 compat=1 ip=0xf6eea549 code=0x0 09:38:35 executing program 1: preadv2(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000100)=""/187, 0xbb}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x13) 09:38:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)={0x34, r1, 0x7, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5}]}, 0x34}}, 0x0) 09:38:35 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000280), &(0x7f0000000700)=@v2={0x0, 0x0, 0x0, 0x0, 0xfd8, "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"}, 0x200016e1, 0x0) 09:38:35 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x74, 0x0]}}]}) 09:38:35 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in=@broadcast, @in6=@mcast2}, {0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7fffffff}, {0x9}}, {{@in=@multicast2}, 0x0, @in6=@local}}, 0xe8) tkill(r0, 0x3a) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 09:38:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:36 executing program 1: preadv2(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000100)=""/187, 0xbb}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x13) 09:38:36 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00') 09:38:36 executing program 3: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmat(r0, &(0x7f0000ffb000/0x4000)=nil, 0x6000) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x1fffff, 0x1, 0x11, r1, 0x0) 09:38:36 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x74, 0x0]}}]}) [ 935.140916][T13190] ptrace attach of "/root/syz-executor.0 exec"[13189] was attempted by "/root/syz-executor.0 exec"[13190] 09:38:36 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x3e80}, 0x0) 09:38:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:36 executing program 1: preadv2(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000100)=""/187, 0xbb}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x13) 09:38:36 executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/kexec_crash_loaded', 0x700, 0x0) 09:38:36 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x7a, 0x0) 09:38:37 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x74, 0x0]}}]}) 09:38:37 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x60) 09:38:37 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv2(r0, &(0x7f0000000640)=[{&(0x7f0000000100)=""/187, 0xbb}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x13) 09:38:37 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x0) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:37 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=""/1, 0x1) 09:38:37 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f0000002440)={&(0x7f0000000000)=@hci, 0x80, &(0x7f0000002300)=[{&(0x7f0000000080)=""/22, 0x16}, {&(0x7f00000000c0)=""/64, 0xffffffb3}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/4096, 0x1000}, {&(0x7f0000002880)=""/102400, 0x5}, {&(0x7f0000002140)=""/149, 0x95}, {&(0x7f0000002200)=""/32, 0x20}, {&(0x7f00000027c0)=""/190, 0xbe}], 0x8, &(0x7f0000002380)=""/166, 0xa6}, 0x0) 09:38:37 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x74, 0x0]}}]}) 09:38:37 executing program 0: syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x30]}}}}]}) 09:38:37 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv2(r0, &(0x7f0000000640)=[{&(0x7f0000000100)=""/187, 0xbb}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x13) 09:38:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x0) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:38 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/stat\x00', 0x0, 0x0) preadv2(r0, &(0x7f0000000580)=[{0x0}, {&(0x7f00000000c0)=""/179, 0xb3}, {&(0x7f0000000180)=""/90, 0x5a}], 0x3, 0x4, 0x0, 0x0) 09:38:38 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000000), 0x0, 0x12, 0x0) 09:38:38 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x74, 0x0]}}]}) 09:38:38 executing program 0: inotify_add_watch(0xffffffffffffffff, 0x0, 0x4800002) 09:38:38 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv2(r0, &(0x7f0000000640)=[{&(0x7f0000000100)=""/187, 0xbb}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x13) 09:38:38 executing program 3: prctl$PR_SET_PDEATHSIG(0x18, 0x4032) 09:38:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x0) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:38 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}]}) 09:38:39 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv2(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000100)=""/187, 0xbb}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x13) 09:38:39 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x74, 0x0]}}]}) 09:38:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=@FILEID_INO32_GEN={0x8}, 0x0, 0x0) [ 938.148983][T13260] tmpfs: Bad value for 'mpol' 09:38:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000000000)="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", 0x2000, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000002000), 0x0, 0x0) setuid(0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)='debugfs\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(r0, 0x406, r2) perf_event_open(&(0x7f0000002080)={0x0, 0x80, 0x0, 0x0, 0xf7, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xea, 0x4, @perf_bp={&(0x7f0000002040)}, 0x4001, 0x7ff, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r3 = dup2(r1, r0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) 09:38:39 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000240), 0x24, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000240)={{}, {}, [{0x2, 0x0, 0xee01}, {0x2, 0x0, 0xee00}, {}, {}]}, 0x44, 0x0) 09:38:39 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv2(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000100)=""/187, 0xbb}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x13) 09:38:39 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:39 executing program 0: clone3(&(0x7f0000000800)={0x21c1000, 0x0, 0x0, &(0x7f0000000640), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:38:39 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), 0x0, 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x74, 0x0]}}]}) 09:38:40 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv2(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000100)=""/187, 0xbb}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x13) 09:38:40 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0xc020660b, 0x0) 09:38:40 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:40 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), 0x0, 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x74, 0x0]}}]}) 09:38:41 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv2(r0, 0x0, 0x0, 0x0, 0x0, 0x13) 09:38:41 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$squashfs(0x0, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:38:41 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002a00)=[{{&(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e, 0x0}}], 0x1, 0x0) 09:38:41 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000080)={0x11, 0x11, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) 09:38:41 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), 0x0, 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x74, 0x0]}}]}) 09:38:41 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv2(r0, 0x0, 0x0, 0x0, 0x0, 0x13) 09:38:41 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:42 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r0, 0x107, 0x6, 0x0, &(0x7f0000000780)) 09:38:42 executing program 4: prctl$PR_SET_PDEATHSIG(0x21, 0x4032) 09:38:42 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv2(r0, 0x0, 0x0, 0x0, 0x0, 0x13) 09:38:42 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) clone3(&(0x7f0000003580)={0x100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:38:42 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x74, 0x0]}}]}) 09:38:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:42 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x281008, 0x0) 09:38:42 executing program 3: io_uring_setup(0x1494, &(0x7f0000000100)={0x0, 0x11cb, 0xe}) 09:38:42 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f0000000400)={&(0x7f0000000280), 0x2000028c, &(0x7f00000003c0)={&(0x7f0000000480)=ANY=[], 0x94}}, 0x0) 09:38:42 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv2(r0, &(0x7f0000000640)=[{&(0x7f0000000100)=""/187, 0xbb}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0, 0x0, 0x13) 09:38:43 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x74, 0x0]}}]}) 09:38:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:43 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in=@broadcast, @in6=@mcast2}, {0x40, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7fffffff}, {0x9}}, {{@in=@multicast2}, 0x0, @in6=@local}}, 0xe8) tkill(r0, 0x3a) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 09:38:43 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, 0x0, 0x0, 0x0) 09:38:43 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) sendmsg$nl_crypto(r0, &(0x7f0000000600)={&(0x7f0000000440), 0xc, &(0x7f00000005c0)={0x0, 0x120}}, 0x0) 09:38:43 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv2(r0, &(0x7f0000000640)=[{&(0x7f0000000100)=""/187, 0xbb}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7, 0x0, 0x0, 0x13) 09:38:44 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x74, 0x0]}}]}) 09:38:44 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000000), &(0x7f0000000040)=@v2, 0x9, 0x0) 09:38:44 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:44 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv2(r0, &(0x7f0000000640)=[{&(0x7f0000000100)=""/187, 0xbb}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6, 0x0, 0x0, 0x13) 09:38:44 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000240)={{}, {0x1, 0x4}, [{0x2, 0x0, 0xee01}, {0x2, 0x0, 0xee00}, {}, {0x2, 0x1}, {0x2, 0x4, 0xee01}], {0x4, 0x2}, [], {0x10, 0x1}}, 0x4c, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f00000002c0), 0x24, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000240)={{}, {0x1, 0x4}, [{0x2, 0x0, 0xee01}, {0x2, 0x0, 0xee00}, {}, {0x2, 0x1}, {0x2, 0x4, 0xee01}], {0x4, 0x2}, [], {0x10, 0x1}}, 0x4c, 0x0) 09:38:44 executing program 4: io_uring_setup(0x1bd6, &(0x7f0000000080)) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 09:38:44 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, 0x0) 09:38:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000080)=@abs, 0x6e) 09:38:45 executing program 0: prctl$PR_SET_PDEATHSIG(0x34, 0x0) 09:38:45 executing program 4: io_uring_setup(0x23d1, &(0x7f0000000080)={0x0, 0xb9d7, 0x8}) 09:38:45 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv2(r0, &(0x7f0000000640)=[{&(0x7f0000000100)=""/187, 0xbb}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5, 0x0, 0x0, 0x13) 09:38:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x0) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:45 executing program 3: pipe2(&(0x7f0000002280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)=ANY=[], 0xfffffffffffffe5d) 09:38:45 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, 0x0) 09:38:45 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv2(r0, &(0x7f0000000640)=[{&(0x7f0000000100)=""/187, 0xbb}, {0x0}, {0x0}, {0x0}], 0x4, 0x0, 0x0, 0x13) 09:38:45 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x0) 09:38:45 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={0x0, 0xfffffffffffffc93}}, 0x0) 09:38:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x0) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) [ 944.877713][ T1202] ieee802154 phy0 wpan0: encryption failed: -22 [ 944.884681][ T1202] ieee802154 phy1 wpan1: encryption failed: -22 09:38:46 executing program 0: r0 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x80031, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r0, 0x0, 0x0, 0x0) 09:38:46 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)={[], [{@smackfsroot={'smackfsroot', 0x3d, '\b\x00pfs\b'}}]}) 09:38:46 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv2(r0, &(0x7f0000000640)=[{&(0x7f0000000100)=""/187, 0xbb}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x13) 09:38:46 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, 0x0) 09:38:46 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x0) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:46 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000080)={[{@nr_blocks={'nr_blocks', 0x3d, [0x38, 0x39]}}]}) 09:38:46 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv2(r0, &(0x7f0000000640)=[{&(0x7f0000000100)=""/187, 0xbb}, {0x0}], 0x2, 0x0, 0x0, 0x13) 09:38:46 executing program 0: shmat(0x0, &(0x7f0000fec000/0x12000)=nil, 0x4000) shmat(0x0, &(0x7f0000a61000/0x4000)=nil, 0x4000) shmat(0x0, &(0x7f0000fed000/0x1000)=nil, 0x5000) [ 945.686667][T13428] tmpfs: Unknown parameter 'smackfsroot' [ 945.749550][T13428] tmpfs: Unknown parameter 'smackfsroot' 09:38:47 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}]}) 09:38:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$sock(r0, &(0x7f0000003300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 09:38:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x0) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:47 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)={[], [{@smackfsdef={'smackfsdef', 0x25, 'huge=advise'}}]}) 09:38:47 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv2(r0, &(0x7f0000000640)=[{&(0x7f0000000100)=""/187, 0xbb}], 0x1, 0x0, 0x0, 0x13) 09:38:47 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x500}, 0x0) 09:38:47 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv2(r0, &(0x7f0000000100)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0xfffffe97}, {0x0}, {0x0}, {&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f0000000040)=""/109, 0x6d}], 0xb, 0x0, 0x0, 0x0) 09:38:47 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}]}) 09:38:48 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv2(r0, &(0x7f0000000640), 0x0, 0x0, 0x0, 0x13) 09:38:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000300)={&(0x7f0000000000), 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[], 0x44}}, 0x0) [ 946.930888][T13455] tmpfs: Unknown parameter 'smackfsdef%huge' [ 946.947317][T13455] tmpfs: Unknown parameter 'smackfsdef%huge' 09:38:48 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x0) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:48 executing program 3: prctl$PR_SET_PDEATHSIG(0x16, 0x0) 09:38:48 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}]}) 09:38:48 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000280)={&(0x7f0000000040), 0x4, &(0x7f0000000080)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x0, 0x0, {}, ["", ""]}, 0x14}}, 0x0) 09:38:48 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv2(r0, &(0x7f0000000640), 0x0, 0x0, 0x0, 0x13) 09:38:48 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/consoles\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x541b, 0x0) 09:38:49 executing program 3: syz_io_uring_setup(0x1a0f, &(0x7f0000000200)={0x0, 0x0, 0x2, 0x0, 0x80008005}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) 09:38:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x0) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:49 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@nr_blocks={'nr_blocks', 0x3d, [0x31]}}]}) 09:38:49 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x74]}}]}) 09:38:49 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv2(r0, &(0x7f0000000640), 0x0, 0x0, 0x0, 0x13) 09:38:49 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={0x0, 0x33fe0}}, 0x0) 09:38:49 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x400411, 0x0) 09:38:50 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv2(r0, &(0x7f0000000640)=[{0x0}], 0x1, 0x0, 0x0, 0x13) 09:38:50 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000240), 0x24, 0x0) syz_mount_image$squashfs(0x0, &(0x7f0000001940)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:38:50 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks}]}) 09:38:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0x0, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:50 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={[{@noprefix}]}) 09:38:50 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @remote}, 0x10) 09:38:50 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv2(r0, &(0x7f0000000640)=[{0x0}], 0x1, 0x0, 0x0, 0x13) [ 949.634808][T13513] cgroup: noprefix used incorrectly [ 949.634985][T13510] tmpfs: Bad value for 'nr_blocks' 09:38:51 executing program 0: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x80031, 0xffffffffffffffff, 0x8000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x80031, 0xffffffffffffffff, 0x8000000) 09:38:51 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks}]}) 09:38:51 executing program 4: shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x7007) 09:38:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0x0, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:51 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 09:38:51 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv2(r0, &(0x7f0000000640)=[{0x0}], 0x1, 0x0, 0x0, 0x13) [ 950.758587][T13535] tmpfs: Bad value for 'nr_blocks' 09:38:52 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x5452, 0x0) 09:38:52 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks}]}) 09:38:52 executing program 0: prctl$PR_SET_PDEATHSIG(0x23, 0x0) 09:38:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0x0, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:52 executing program 3: r0 = openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) preadv2(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:38:52 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv2(r0, &(0x7f0000000640)=[{&(0x7f0000000100)=""/187, 0xbb}], 0x1, 0x0, 0x0, 0x0) 09:38:52 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={[{@name={'name', 0x3d, 'nr_blocks'}}]}) [ 951.471567][T13546] tmpfs: Bad value for 'nr_blocks' 09:38:52 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x0]}}]}) 09:38:53 executing program 1: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x9, 0x6, 0x0, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 09:38:53 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in=@broadcast, @in6=@mcast2}, {}, {0x4}}, {{@in6=@private1}, 0x0, @in=@local}}, 0xe8) tkill(r0, 0x3a) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 09:38:53 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={&(0x7f0000000040)=ANY=[], 0x33fe0}}, 0x0) 09:38:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) [ 952.042812][T13557] cgroup: No subsys list or none specified 09:38:53 executing program 4: getresuid(&(0x7f0000000000), 0x0, 0x0) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x7000) 09:38:53 executing program 0: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000080), 0x2) fsetxattr$security_ima(r0, 0x0, 0x0, 0x0, 0xd10dcaaa1f3a1d79) [ 952.330262][T13561] tmpfs: Bad value for 'nr_blocks' [ 952.331165][T13566] ptrace attach of "/root/syz-executor.0 exec"[13565] was attempted by "/root/syz-executor.0 exec"[13566] 09:38:53 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001f40), 0x0, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000080), 0x0, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) 09:38:53 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x0]}}]}) [ 952.531066][T13572] ptrace attach of "/root/syz-executor.1 exec"[13569] was attempted by "/root/syz-executor.1 exec"[13572] 09:38:53 executing program 1: prctl$PR_SET_PDEATHSIG(0x1c, 0x0) 09:38:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:54 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0xf000}, 0x0) 09:38:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$sock(r0, &(0x7f0000003300)=[{{&(0x7f0000000000)=@tipc=@name, 0x80, 0x0}}], 0x1, 0x0) 09:38:54 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x1fffff, 0x1, 0x11, r0, 0x0) shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x5000) [ 953.214045][T13585] tmpfs: Bad value for 'nr_blocks' 09:38:54 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x14, 0x0, 0x0) 09:38:54 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x0]}}]}) 09:38:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:54 executing program 4: io_uring_setup(0x843, &(0x7f0000000340)={0x0, 0x0, 0x16}) 09:38:55 executing program 0: syz_open_dev$rtc(&(0x7f00000000c0), 0xffffffffffff8000, 0xc042) 09:38:55 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0xc0045878, 0x0) 09:38:55 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)) llistxattr(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 954.015083][T13601] tmpfs: Bad value for 'nr_blocks' 09:38:55 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@nr_blocks={'nr_blocks', 0x3d, [0x74]}}]}) 09:38:55 executing program 4: prctl$PR_SET_PDEATHSIG(0x39, 0x4032) 09:38:55 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000002180), 0x8000205, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x125f) 09:38:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:55 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0xa, 0x0, 0x0) 09:38:56 executing program 3: openat$ttyS3(0xffffffffffffff9c, &(0x7f000000afc0), 0x100700, 0x0) 09:38:56 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@nr_blocks}]}) 09:38:56 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={[{@name}]}) 09:38:56 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x803e0000}}, 0x0) 09:38:56 executing program 1: r0 = shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x7000) shmdt(r0) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x0) 09:38:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:38:56 executing program 3: socket(0x0, 0x5188f74bde886278, 0x0) [ 955.611157][T13636] tmpfs: Bad value for 'nr_blocks' [ 955.620732][T13637] cgroup: Bad value for 'name' 09:38:57 executing program 4: r0 = getpid() r1 = syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d00002000400000026010000000000000602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd010000000000000100000000000000dc01", 0x200}], 0x0, &(0x7f00000000c0)=ANY=[]) timer_create(0x6, 0x0, 0x0) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000280)={0x14, 0x67, 0x1, {0x80}}, 0x14) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000b80)={0x0, 0x5, 0x80000001}) openat(r1, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) getpgrp(r0) gettid() 09:38:57 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@nr_blocks}]}) 09:38:57 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv2(r0, &(0x7f0000000640)=[{0x0, 0xffffffffffffffff}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x0) 09:38:57 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x281008, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 09:38:57 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x33fe0}}, 0x0) 09:38:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) [ 956.405935][T13654] loop4: detected capacity change from 0 to 1 [ 956.493195][T13659] tmpfs: Bad value for 'nr_blocks' 09:38:57 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@nr_blocks}]}) [ 956.611555][T13654] loop4: detected capacity change from 0 to 1 09:38:57 executing program 1: r0 = shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) shmdt(r0) 09:38:58 executing program 4: prctl$PR_SET_PDEATHSIG(0x35, 0x4032) 09:38:58 executing program 3: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) 09:38:58 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f00000005c0)={&(0x7f00000004c0), 0xc, &(0x7f0000000580)={0x0}, 0x10}, 0x0) 09:38:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) [ 957.409468][T13684] tmpfs: Bad value for 'nr_blocks' 09:38:58 executing program 1: shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x7000) r0 = shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x7000) shmdt(r0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 09:38:58 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@nr_blocks={'nr_blocks', 0x3d, [0x0]}}]}) 09:38:58 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000880)=@file={0x1, './file0\x00'}, 0x6e) 09:38:59 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x12, 0x0, 0x0) 09:38:59 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000240), 0x24, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000240)={{}, {}, [], {}, [], {0x10, 0x1}}, 0x24, 0x0) 09:38:59 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x1fffff, 0x1, 0x11, r0, 0x0) 09:38:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) [ 958.283150][T13702] tmpfs: Bad value for 'nr_blocks' 09:38:59 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@nr_blocks={'nr_blocks', 0x3d, [0x0]}}]}) 09:38:59 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x9effffff}, 0x0) 09:38:59 executing program 3: prctl$PR_SET_PDEATHSIG(0x34, 0x4032) 09:38:59 executing program 0: socketpair(0x2, 0x3, 0x2, &(0x7f0000000080)) 09:39:00 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000000), r1) sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f0000000340)={&(0x7f0000000080), 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x54, r2, 0x11, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @local}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @local}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @dev}, @NLBL_UNLABEL_A_IFACE={0x0, 0x6, 'macsec0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0xfdc4}]}, 0x54}}, 0x0) 09:39:00 executing program 1: mount$tmpfs(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) 09:39:00 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000002800)={0x0, 0x0, 0x0, 0x40000}, 0x0) [ 959.039514][T13716] tmpfs: Bad value for 'nr_blocks' 09:39:00 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) syz_mount_image$tmpfs(&(0x7f00000065c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20080b2, &(0x7f0000000740)={[{@nr_blocks={'nr_blocks', 0x3d, [0x0]}}]}) 09:39:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:39:00 executing program 0: socketpair(0x10, 0x0, 0x0, &(0x7f0000000040)) [ 959.559174][T13727] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 09:39:00 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x881, &(0x7f00000001c0)=ANY=[]) lremovexattr(&(0x7f0000000080)='./file0\x00', 0x0) 09:39:00 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000002c0)={0x1, &(0x7f0000000180)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000200)={0x0, 0x1, r1, 0x7fc}) 09:39:01 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x1fffff, 0x1, 0x11, r0, 0x0) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x5000) [ 959.921616][T13734] tmpfs: Bad value for 'nr_blocks' 09:39:01 executing program 2: sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) socketpair(0x1d, 0x0, 0x0, &(0x7f0000000240)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0x0}, 0x0) pipe2(0x0, 0x0) preadv2(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) 09:39:01 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=ANY=[], 0x94}}, 0x20000000) [ 960.372115][ T24] audit: type=1326 audit(1639129141.616:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13740 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=240 compat=1 ip=0xf6eea549 code=0x0 09:39:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:39:01 executing program 4: io_uring_setup(0x723d, &(0x7f0000000080)) r0 = io_uring_setup(0x5902, &(0x7f0000000280)) mmap$IORING_OFF_SQES(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x3, 0x11, r0, 0x10000000) 09:39:01 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000001a80), &(0x7f0000000180)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r0, 0x40047211, &(0x7f00000000c0)=0x2) [ 960.821910][T13750] can: request_module (can-proto-0) failed. [ 960.893152][T13757] can: request_module (can-proto-0) failed. 09:39:02 executing program 0: r0 = shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x6000) shmdt(r0) shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x0) 09:39:02 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x541b, 0x0) [ 961.186544][ T24] audit: type=1326 audit(1639129142.426:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13740 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=240 compat=1 ip=0xf6eea549 code=0x0 [ 961.276333][T13768] loop1: detected capacity change from 0 to 87 09:39:02 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0xf, 0x0, 0x0) 09:39:02 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x2}, 0xc, &(0x7f00000003c0)={0x0, 0x33fe0}}, 0x0) 09:39:02 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:39:02 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_START(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x44041}, 0x8) 09:39:03 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) read$char_usb(r0, &(0x7f0000001080)=""/123, 0x7b) 09:39:03 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000040)={0x0, 0x10200}) 09:39:03 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0, 0x94}, 0x1, 0x0, 0x2528}, 0x0) 09:39:03 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x541b, 0x0) 09:39:03 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)) mount$bind(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x24000, 0x0) 09:39:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:39:03 executing program 1: prctl$PR_SET_PDEATHSIG(0x24, 0x4032) 09:39:03 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000002800)={0x0, 0x0, 0x0}, 0x0) 09:39:03 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) 09:39:03 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x7000) 09:39:04 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x8}, 0x0) 09:39:04 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d1", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:39:04 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_START(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x2, 0x70bd29, 0x25dfdbfc, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x44041}, 0x8) 09:39:04 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, 0x0, 0x470481, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000000), r2) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r3, 0xb1d}, 0x14}}, 0x0) sendmsg$NLBL_UNLABEL_C_ACCEPT(r1, &(0x7f0000000340)={&(0x7f0000000080), 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x54, r3, 0x11, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @local}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @local}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @dev={0xfe, 0x80, '\x00', 0x2b}}, @NLBL_UNLABEL_A_IFACE={0x0, 0x6, 'macsec0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0xfdc4}]}, 0x54}}, 0x24004808) ioctl$F2FS_IOC_GET_FEATURES(r0, 0x8004f50c, &(0x7f0000000180)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) splice(r0, &(0x7f00000001c0)=0x2d97, r0, &(0x7f0000000200)=0x7ff, 0xfffffffffffffffa, 0xf) 09:39:04 executing program 3: pipe2(&(0x7f0000002280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000100), &(0x7f0000000140)=ANY=[], 0xfe1, 0x0) 09:39:04 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000002180), 0x8000205, 0x1) fallocate(r0, 0x0, 0x0, 0x9) 09:39:05 executing program 2: shmat(0x0, &(0x7f0000800000/0x800000)=nil, 0x4000) [ 964.022541][T13830] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 09:39:05 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = getpgid(0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000022c0)=r1) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000002100)) 09:39:05 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d1", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) [ 964.203444][T13833] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 09:39:05 executing program 3: perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) mlock(&(0x7f0000480000/0x2000)=nil, 0x2000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) madvise(&(0x7f0000cbb000/0x1000)=nil, 0x1000, 0x15) madvise(&(0x7f00001c2000/0x1000)=nil, 0x1000, 0x3) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x5, 0x200000005d832, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0xf) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) creat(&(0x7f00000000c0)='./file0\x00', 0x155) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mbind(&(0x7f00001dc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0xfffffffffffffffd, 0x2) 09:39:05 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') 09:39:05 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0xc0189436, 0x0) 09:39:06 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000c00), r0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000d40)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010e1e1efa23635e07250700000014000200000000000000000000000000000000001400020000000000000000000000ffffffffffff080004000a01010214000600726f7365300000000000000000000003"], 0x58}}, 0x0) 09:39:06 executing program 0: prctl$PR_SET_PDEATHSIG(0xf, 0x0) 09:39:06 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d1", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:39:06 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454d9, 0x0) [ 974.180851][ C1] clocksource: timekeeping watchdog on CPU1: Marking clocksource 'tsc' as unstable because the skew is too large: [ 974.193137][ C1] clocksource: 'acpi_pm' wd_nsec: 0 wd_now: 30ef0e wd_last: 4d6b02 mask: ffffff [ 974.204528][ C1] clocksource: 'tsc' cs_nsec: 8852437978 cs_now: 1f73cdc4a88 cs_last: 1f2b409d0ee mask: ffffffffffffffff [ 974.217970][ C1] clocksource: 'tsc' is current clocksource. [ 974.226122][ C1] tsc: Marking TSC unstable due to clocksource watchdog [ 974.255903][T12059] TSC found unstable after boot, most likely due to broken BIOS. Use 'tsc=unstable'. [ 974.265622][T12059] sched_clock: Marking unstable (974507758494, -251824891)<-(974256256046, -428504) 09:39:15 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@mpol={'mpol', 0x3d, {'local', '=relative', @void}}}]}) 09:39:15 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000040), &(0x7f0000000700)=@ng, 0xfe9d, 0x0) pipe2(&(0x7f0000002280), 0x0) [ 974.408625][T13868] clocksource: Checking clocksource tsc synchronization from CPU 1 to CPUs 0. 09:39:15 executing program 0: prctl$PR_SET_PDEATHSIG(0x2f, 0x1) [ 974.498404][T13868] clocksource: Switched to clocksource acpi_pm 09:39:15 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) [ 974.790228][T13873] tmpfs: Bad value for 'mpol' [ 974.812068][T13873] tmpfs: Bad value for 'mpol' 09:39:16 executing program 4: r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x7000) r1 = shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x7000) shmdt(r1) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x7000) [ 975.394928][ T24] audit: type=1800 audit(1639129156.630:54): pid=13876 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=set_data cause=unavailable-hash-algorithm comm="syz-executor.2" name="/net/tun" dev="devtmpfs" ino=686 res=0 errno=0 [ 975.580260][ T24] audit: type=1800 audit(1639129156.660:55): pid=13876 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=set_data cause=unavailable-hash-algorithm comm="syz-executor.2" name="/net/tun" dev="devtmpfs" ino=686 res=0 errno=0 09:39:17 executing program 3: perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) mlock(&(0x7f0000480000/0x2000)=nil, 0x2000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) madvise(&(0x7f0000cbb000/0x1000)=nil, 0x1000, 0x15) madvise(&(0x7f00001c2000/0x1000)=nil, 0x1000, 0x3) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x5, 0x200000005d832, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0xf) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) creat(&(0x7f00000000c0)='./file0\x00', 0x155) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mbind(&(0x7f00001dc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0xfffffffffffffffd, 0x2) 09:39:17 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000100)='./file0\x00', 0x4) 09:39:17 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x4051) 09:39:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:39:17 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000002800)={0x0, 0x0, 0x0}, 0x40) 09:39:17 executing program 2: openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0xe801, 0x0) 09:39:17 executing program 0: perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) mlock(&(0x7f0000480000/0x2000)=nil, 0x2000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) madvise(&(0x7f0000cbb000/0x1000)=nil, 0x1000, 0x15) madvise(&(0x7f00001c2000/0x1000)=nil, 0x1000, 0x3) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x5, 0x200000005d832, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0xf) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) creat(&(0x7f00000000c0)='./file0\x00', 0x155) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mbind(&(0x7f00001dc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0xfffffffffffffffd, 0x2) 09:39:17 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x40, 0x0) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB]) read$FUSE(r1, &(0x7f0000006380)={0x2020}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f}}, 0x50) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lseek(r0, 0x0, 0x4) dup3(0xffffffffffffffff, r1, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 09:39:17 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000000), r1) sendmsg$NLBL_UNLABEL_C_STATICLIST(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 09:39:17 executing program 1: prctl$PR_SET_PDEATHSIG(0x3a, 0x4032) 09:39:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:39:40 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={[], [{@smackfshat={'smackfshat', 0x3d, 'security.apparmor\x00'}}]}) [ 999.636125][T13924] tmpfs: Unknown parameter 'smackfshat' 09:39:43 executing program 3: perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) mlock(&(0x7f0000480000/0x2000)=nil, 0x2000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) madvise(&(0x7f0000cbb000/0x1000)=nil, 0x1000, 0x15) madvise(&(0x7f00001c2000/0x1000)=nil, 0x1000, 0x3) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x5, 0x200000005d832, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0xf) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) creat(&(0x7f00000000c0)='./file0\x00', 0x155) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mbind(&(0x7f00001dc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0xfffffffffffffffd, 0x2) 09:39:43 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x0) 09:39:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e2", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:39:43 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000080), 0x10) 09:39:43 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000040)=@abs={0x1}, 0x6e) 09:39:43 executing program 0: prctl$PR_SET_PDEATHSIG(0x27, 0x4032) 09:39:44 executing program 4: syz_mount_image$squashfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000022c0)) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000240), 0x24, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000240), 0x24, 0x0) 09:39:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={&(0x7f0000000180), 0x8, &(0x7f0000000100)={&(0x7f0000000580)=ANY=[@ANYBLOB="3a9cfd84f8bbd27673130d34c8c1d014bd65fc587850802acdc05dc7b47802464b62c825add933727955f57d6b7beb98f4a219ff1eae23baf7f196d521a9dd59338b07b0620d49117739b18806f054531a782f63ba9c489db61b282ab47dbb3e55d26b62ffbca9df0f1dd5894995f30cf007000000000000006a1223e9bd74bd88311ce15f8b86da60ff0725a9172e0d0c4f21c364d6bb745a3978893d5976e49e5417991ad6fe1fbc885dbb068dc292546735aa", @ANYRES16=0x0, @ANYBLOB="ee000008638463ab967f8cca8a0000000000000d2580f12608353018096c3623fd83c657ca12a61c5fe7397541039dd525b3ed1e973719eed02b6ebeca5884dc2ffa656cfdf26d3d30aa90fe76824132dac898ba243722546f234f1bad38a40cefe8a449721d83f9f52035b5c00c18ffbc1e392aa4be07ebd9f605a5d7a66914dcb85c35940fdd11f004c34f9d4395023365c40bfa52c851988c6810c2578da6ae1a"], 0x1c}, 0x1, 0x0, 0x0, 0x5010}, 0x8000) 09:39:44 executing program 2: prctl$PR_SET_PDEATHSIG(0x29, 0x0) 09:39:44 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$ipvs(&(0x7f00000012c0), r0) 09:39:44 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e2", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:39:44 executing program 2: prctl$PR_SET_PDEATHSIG(0x35, 0x0) [ 1010.971587][ T1202] ieee802154 phy0 wpan0: encryption failed: -22 [ 1010.978619][ T1202] ieee802154 phy1 wpan1: encryption failed: -22 09:39:52 executing program 3: prctl$PR_SET_PDEATHSIG(0x1a, 0x0) 09:39:52 executing program 0: ioctl$BINDER_THREAD_EXIT(0xffffffffffffffff, 0x40046208, 0x0) socketpair(0x11, 0x3, 0x0, &(0x7f0000000080)) 09:39:52 executing program 4: prctl$PR_SET_PDEATHSIG(0x10, 0x0) 09:39:52 executing program 2: setresgid(0x0, 0xffffffffffffffff, 0xee01) setresgid(0xee01, 0xee01, 0x0) 09:39:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e2", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:39:52 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_rdma(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000002200)={'trans=rdma,', {}, 0x2c, {[{@common=@version_L}]}}) 09:39:52 executing program 2: syz_open_dev$vcsn(&(0x7f0000000240), 0x0, 0x0) 09:39:52 executing program 4: r0 = openat$autofs(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, 0x0) 09:39:52 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_QUERYCAP(r0, 0x80685600, 0x0) 09:39:52 executing program 1: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) clock_gettime(0x0, &(0x7f0000000200)) select(0x40, &(0x7f0000000140), 0x0, &(0x7f00000001c0)={0x3f}, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0xf) 09:39:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20d", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:39:52 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000004380)) 09:39:53 executing program 2: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004380)) 09:39:53 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000280)={0x0, r1+30000000}, 0x0) 09:39:53 executing program 0: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0x5450, 0x0) 09:39:53 executing program 1: write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, 0x0, 0x0) 09:39:53 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_QUERYCAP(r0, 0x40049409, &(0x7f0000000200)) 09:39:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20d", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:39:53 executing program 2: r0 = request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='\x00', 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000000c0)={r0, 0x0, 0xc0}, &(0x7f0000000100)={'enc=', 'oaep', ' hash=', {'crct10dif\x00'}}, &(0x7f0000000180), &(0x7f0000000240)=""/192) add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f00000004c0)='cifs.spnego\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000540)='\x00', 0x0) r1 = add_key$keyring(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = request_key(&(0x7f0000000600)='.request_key_auth\x00', &(0x7f0000000640)={'syz', 0x3}, &(0x7f0000000680)='crct10dif\x00', r1) keyctl$restrict_keyring(0x1d, r2, &(0x7f00000006c0)='encrypted\x00', 0x0) 09:39:54 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x1, 0x2000000, &(0x7f0000000380)='7'}) 09:39:54 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x2e0, 0x0, 0xffffffff, 0xffffffff, 0xd0, 0xffffffff, 0x210, 0xffffffff, 0xffffffff, 0x210, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE2={0x28}}, {{@uncond, 0x0, 0x118, 0x140, 0x0, {}, [@common=@unspec=@helper={{0x48}, {0x0, 'amanda\x00'}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@SYNPROXY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x340) 09:39:54 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/crypto\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, 0x0, 0x0, 0x0) [ 1013.178754][T14022] binder: 14019:14022 ioctl c0306201 200003c0 returned -14 09:39:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20d", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:39:54 executing program 0: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_usb_connect$cdc_ecm(0x0, 0x58, &(0x7f00000000c0)={{0x12, 0x1, 0x250, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x46, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x2, 0x6, 0x0, 0x0, {{0x8, 0x24, 0x6, 0x0, 0x0, "2fcdfe"}, {0x5}, {0xd}, [@acm={0x4}, @mdlm_detail={0x4}]}, {[], {{0x9, 0x5, 0x82, 0x2, 0x20, 0x0, 0x55}}, {{0x9, 0x5, 0x3, 0x2, 0x0, 0x0, 0x1, 0x7}}}}}]}}]}}, &(0x7f0000000440)={0x0, 0x0, 0x24, &(0x7f0000000200)={0x5, 0xf, 0x24, 0x3, [@wireless={0xb, 0x10, 0x1, 0xc, 0x4, 0xff, 0x1}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x0, 0x0, 0xe8}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x0, 0x7}]}, 0x1, [{0x0, 0x0}]}) 09:39:54 executing program 2: getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, 0x0) 09:39:55 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, 0x0, 0x0, 0xffffffffffffffff) 09:39:55 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, 0x0) 09:39:55 executing program 3: bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f00000013c0)=[{0x0}, {0x0}], 0xa9000, &(0x7f0000001480)={[{@shortname_mixed}]}) fspick(r0, 0x0, 0x0) 09:39:55 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, 0x0, 0x0, 0x0) 09:39:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", 0x0, &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) [ 1014.118718][ T8301] usb 1-1: new high-speed USB device number 7 using dummy_hcd 09:39:55 executing program 1: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f00000000c0)={{0x12, 0x1, 0x250, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, &(0x7f0000000440)={0x0, 0x0, 0x5, &(0x7f0000000200)={0x5, 0xf, 0x5}}) 09:39:55 executing program 4: openat$vsock(0xffffffffffffff9c, &(0x7f0000000300), 0x210100, 0x0) 09:39:55 executing program 3: sendmsg$SMC_PNETID_GET(0xffffffffffffffff, 0x0, 0x57889025bf8dcc2d) 09:39:55 executing program 2: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)={0x30}, &(0x7f0000000240), 0x0) [ 1014.558738][ T8301] usb 1-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 32 [ 1014.569311][ T8301] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x3 has invalid wMaxPacketSize 0 [ 1014.581925][ T8301] usb 1-1: config 1 interface 0 altsetting 0 bulk endpoint 0x3 has invalid maxpacket 0 09:39:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", 0x0, &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) [ 1014.978634][T12059] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 1014.980215][ T8301] usb 1-1: string descriptor 0 read error: -22 [ 1014.995448][ T8301] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1015.005400][ T8301] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1015.223007][T14039] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1015.301777][ T8301] usb 1-1: bad CDC descriptors [ 1015.468471][T12059] usb 2-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1015.512762][ T8301] usb 1-1: USB disconnect, device number 7 [ 1015.674556][T12059] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1015.683962][T12059] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1015.692556][T12059] usb 2-1: Product: syz [ 1015.696850][T12059] usb 2-1: Manufacturer: syz [ 1015.701706][T12059] usb 2-1: SerialNumber: syz [ 1015.801277][T12059] cdc_ether: probe of 2-1:1.0 failed with error -22 [ 1016.008858][T12059] usb 2-1: USB disconnect, device number 3 09:39:57 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:39:57 executing program 3: syz_mount_image$f2fs(&(0x7f0000000a40), 0x0, 0x0, 0x0, &(0x7f0000000d40), 0x0, &(0x7f0000000dc0)) 09:39:57 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) 09:39:57 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000001080), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) 09:39:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", 0x0, &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:39:57 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) recvmmsg(r0, &(0x7f0000000700)=[{{&(0x7f0000000000)=@x25={0x9, @remote}, 0x80, &(0x7f0000000180)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0, &(0x7f0000000780)) 09:39:57 executing program 4: syz_mount_image$f2fs(0x0, 0x0, 0x101, 0x1, &(0x7f0000000d40)=[{0x0}], 0x0, 0x0) [ 1016.818640][T12059] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 1017.300256][T12059] usb 2-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1017.488748][T12059] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1017.497969][T12059] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1017.506597][T12059] usb 2-1: Product: syz [ 1017.511073][T12059] usb 2-1: Manufacturer: syz [ 1017.515815][T12059] usb 2-1: SerialNumber: syz [ 1017.632157][T12059] cdc_ether: probe of 2-1:1.0 failed with error -22 09:39:58 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/crypto\x00', 0x0, 0x0) write$eventfd(r0, 0x0, 0x0) 09:39:58 executing program 3: r0 = socket(0x11, 0x3, 0x0) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000580)={&(0x7f00000004c0), 0xc, &(0x7f0000000540)={0x0}}, 0x0) 09:39:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), 0x0, &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:39:58 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$SIOCGIFMTU(r0, 0x8921, 0x0) 09:39:58 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) recvmmsg(r0, &(0x7f0000000700)=[{{&(0x7f0000000000)=@x25={0x9, @remote}, 0x80, &(0x7f0000000180)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0, &(0x7f0000000780)) 09:39:58 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f00000000c0)={{0x12, 0x1, 0x250, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, 0x0) [ 1017.692001][ T8301] usb 2-1: USB disconnect, device number 4 09:39:59 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) recvmmsg(r0, &(0x7f0000000700)=[{{&(0x7f0000000000)=@x25={0x9, @remote}, 0x80, &(0x7f0000000180)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0, &(0x7f0000000780)) 09:39:59 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) io_setup(0x4, &(0x7f0000000300)=0x0) io_submit(r1, 0x1, &(0x7f0000000480)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 09:39:59 executing program 3: open$dir(&(0x7f0000002b80)='./file0\x00', 0x20600, 0x0) [ 1018.229134][T12059] usb 5-1: new high-speed USB device number 5 using dummy_hcd 09:39:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), 0x0, &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:39:59 executing program 1: clock_gettime(0x0, &(0x7f0000000200)={0x0}) pselect6(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0x600000000000000}, &(0x7f0000000240)={r0}, &(0x7f00000002c0)={&(0x7f0000000280)={[0x80]}, 0x8}) [ 1018.619622][T12059] usb 5-1: unable to get BOS descriptor or descriptor too short [ 1018.688938][T12059] usb 5-1: unable to read config index 0 descriptor/start: -71 [ 1018.696981][T12059] usb 5-1: can't read configurations, error -71 09:40:00 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) recvmmsg(r0, &(0x7f0000000700)=[{{&(0x7f0000000000)=@x25={0x9, @remote}, 0x80, &(0x7f0000000180)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0, &(0x7f0000000780)) 09:40:00 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r0, 0x0, 0x0) 09:40:00 executing program 0: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000c80)={@map, 0xffffffffffffffff, 0x15}, 0x10) 09:40:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), 0x0, &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:00 executing program 2: ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, 0x0) syz_mount_image$f2fs(0x0, &(0x7f0000000a80)='./file0\x00', 0x101, 0x1, &(0x7f0000000d40)=[{0x0}], 0x0, 0x0) 09:40:00 executing program 3: syz_usb_connect(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x96, 0x46, 0x13, 0x40, 0x1b3d, 0x118, 0x9faa, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0xa0, 0x5, [{{0x9, 0x4, 0x0, 0x4, 0x2, 0xb9, 0x37, 0x78, 0x0, [], [{{0x9, 0x5, 0x1, 0x2}}, {{0x9, 0x5, 0xf, 0x2, 0x0, 0x7}}]}}]}}]}}, 0x0) [ 1019.439737][T12059] usb 5-1: new high-speed USB device number 6 using dummy_hcd [ 1019.818907][T12059] usb 5-1: unable to get BOS descriptor or descriptor too short 09:40:01 executing program 4: socket(0x1e, 0x0, 0x3) 09:40:01 executing program 0: getresuid(&(0x7f0000000940), 0x0, 0x0) 09:40:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) [ 1019.888895][T12059] usb 5-1: unable to read config index 0 descriptor/start: -71 [ 1019.896657][T12059] usb 5-1: can't read configurations, error -71 09:40:01 executing program 1: lchown(0x0, 0x0, 0x0) mount$cgroup(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000100)) [ 1020.018906][T12059] usb usb5-port1: attempt power cycle 09:40:01 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WIE_ON(r0, 0x700f) 09:40:01 executing program 0: socket$inet(0x2, 0x1, 0x9) [ 1020.258587][ T8301] usb 4-1: new high-speed USB device number 4 using dummy_hcd 09:40:01 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000000240)=@ax25={{0x3, @bcast}, [@netrom, @bcast, @rose, @netrom, @null, @remote, @rose, @default]}, 0x80, &(0x7f0000001700)=[{0x0}, {0x0}], 0x2}, 0x0) [ 1020.648925][ T8301] usb 4-1: config 0 interface 0 altsetting 4 endpoint 0x1 has invalid wMaxPacketSize 0 [ 1020.659103][ T8301] usb 4-1: config 0 interface 0 altsetting 4 bulk endpoint 0x1 has invalid maxpacket 0 [ 1020.669270][ T8301] usb 4-1: config 0 interface 0 altsetting 4 endpoint 0xF has invalid wMaxPacketSize 0 [ 1020.679367][ T8301] usb 4-1: config 0 interface 0 altsetting 4 bulk endpoint 0xF has invalid maxpacket 0 [ 1020.689654][ T8301] usb 4-1: config 0 interface 0 has no altsetting 0 09:40:01 executing program 1: mlock2(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) 09:40:02 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000000)='\xd9\x00', &(0x7f0000000040)='./file0\x00', r0) 09:40:02 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) [ 1021.020488][ T8301] usb 4-1: New USB device found, idVendor=1b3d, idProduct=0118, bcdDevice=9f.aa [ 1021.032407][ T8301] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1021.041152][ T8301] usb 4-1: Product: syz [ 1021.045450][ T8301] usb 4-1: Manufacturer: syz [ 1021.050402][ T8301] usb 4-1: SerialNumber: syz [ 1021.241380][ T8301] usb 4-1: config 0 descriptor?? 09:40:02 executing program 0: fsmount(0xffffffffffffffff, 0x0, 0xc) [ 1021.292805][ T8301] ftdi_sio 4-1:0.0: FTDI USB Serial Device converter detected [ 1021.302795][ T8301] usb 4-1: Detected FT-X [ 1021.307178][ T8301] ftdi_sio ttyUSB0: Overriding wMaxPacketSize on endpoint 1 [ 1021.315068][ T8301] ftdi_sio ttyUSB0: Overriding wMaxPacketSize on endpoint 15 [ 1021.575453][ T8301] ftdi_sio ttyUSB0: Unable to read latency timer: -71 [ 1021.631391][ T8301] ftdi_sio ttyUSB0: Unable to write latency timer: -71 [ 1021.683710][ T8301] ftdi_sio 4-1:0.0: GPIO initialisation failed: -71 [ 1021.764596][ T8301] usb 4-1: FTDI USB Serial Device converter now attached to ttyUSB0 [ 1021.841044][ T8301] usb 4-1: USB disconnect, device number 4 [ 1021.927919][ T8301] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 1021.939873][ T8301] ftdi_sio 4-1:0.0: device disconnected [ 1022.469184][ T8301] usb 4-1: new high-speed USB device number 5 using dummy_hcd [ 1022.839791][ T8301] usb 4-1: config 0 interface 0 altsetting 4 endpoint 0x1 has invalid wMaxPacketSize 0 [ 1022.849894][ T8301] usb 4-1: config 0 interface 0 altsetting 4 bulk endpoint 0x1 has invalid maxpacket 0 [ 1022.860041][ T8301] usb 4-1: config 0 interface 0 altsetting 4 endpoint 0xF has invalid wMaxPacketSize 0 [ 1022.872812][ T8301] usb 4-1: config 0 interface 0 altsetting 4 bulk endpoint 0xF has invalid maxpacket 0 [ 1022.883119][ T8301] usb 4-1: config 0 interface 0 has no altsetting 0 09:40:04 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/crypto\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f00000001c0)='\x00', &(0x7f0000000200)='/proc/crypto\x00', 0x0) 09:40:04 executing program 1: setresuid(0xffffffffffffffff, 0x0, 0x0) setresuid(0x0, 0xffffffffffffffff, 0x0) 09:40:04 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f00000016c0), 0x140, 0x0) 09:40:04 executing program 2: r0 = socket(0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 09:40:04 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:04 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)) [ 1023.136251][ T8301] usb 4-1: New USB device found, idVendor=1b3d, idProduct=0118, bcdDevice=9f.aa [ 1023.145784][ T8301] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1023.262366][ T8301] usb 4-1: config 0 descriptor?? [ 1023.284653][ T8301] usb 4-1: can't set config #0, error -71 [ 1023.346257][ T8301] usb 4-1: USB disconnect, device number 5 09:40:04 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x26) 09:40:04 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000001ac0), 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000001b00)) 09:40:04 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:04 executing program 4: syz_usb_connect(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x96, 0x46, 0x13, 0x40, 0x1b3d, 0x118, 0x9faa, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0xb9, 0x37, 0x78, 0x0, [], [{{0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [@generic={0x2}, @uac_iso={0x7}]}}]}}]}}]}}, 0x0) 09:40:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d0"], 0xd0}}, 0x0) 09:40:05 executing program 2: mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1) 09:40:05 executing program 0: accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) 09:40:05 executing program 1: seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000002bc0)) 09:40:05 executing program 2: remap_file_pages(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000006, 0x0, 0x0) 09:40:05 executing program 3: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) clock_gettime(0x0, &(0x7f0000002240)) recvmmsg(r0, &(0x7f0000002140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:40:05 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) [ 1024.598551][ T8301] usb 5-1: new high-speed USB device number 8 using dummy_hcd [ 1024.961664][ T8301] usb 5-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping 09:40:06 executing program 0: syz_open_dev$vcsu(&(0x7f0000000400), 0x0, 0x0) 09:40:06 executing program 1: syz_open_dev$loop(&(0x7f0000001080), 0x0, 0x0) fork() [ 1025.030994][T14295] mmap: syz-executor.2 (14295) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 1025.132376][ T8301] usb 5-1: New USB device found, idVendor=1b3d, idProduct=0118, bcdDevice=9f.aa [ 1025.142232][ T8301] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1025.150646][ T8301] usb 5-1: Product: syz [ 1025.154945][ T8301] usb 5-1: Manufacturer: syz [ 1025.159826][ T8301] usb 5-1: SerialNumber: syz 09:40:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x20000085) 09:40:06 executing program 2: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f00000000c0)={{0x12, 0x1, 0x250, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x0, 0x0}]}) [ 1025.339757][ T8301] usb 5-1: config 0 descriptor?? [ 1025.400973][ T8301] ftdi_sio 5-1:0.0: FTDI USB Serial Device converter detected [ 1025.410307][ T8301] usb 5-1: Detected FT-X [ 1025.590111][ T8301] ftdi_sio ttyUSB0: Unable to read latency timer: -71 [ 1025.613431][ T8301] ftdi_sio ttyUSB0: Unable to write latency timer: -71 [ 1025.673051][ T8301] ftdi_sio 5-1:0.0: GPIO initialisation failed: -71 [ 1025.753159][ T8301] usb 5-1: FTDI USB Serial Device converter now attached to ttyUSB0 [ 1025.847009][ T8301] usb 5-1: USB disconnect, device number 8 [ 1025.896430][ T8301] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 1025.907698][ T8301] ftdi_sio 5-1:0.0: device disconnected [ 1026.298679][T12059] usb 3-1: new high-speed USB device number 6 using dummy_hcd [ 1026.529256][ T8301] usb 5-1: new high-speed USB device number 9 using dummy_hcd [ 1026.710327][T12059] usb 3-1: unable to get BOS descriptor or descriptor too short [ 1026.811326][T12059] usb 3-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1026.890060][ T8301] usb 5-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 1027.063931][ T8301] usb 5-1: New USB device found, idVendor=1b3d, idProduct=0118, bcdDevice=9f.aa [ 1027.075771][ T8301] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1027.084581][ T8301] usb 5-1: Product: syz [ 1027.089070][ T8301] usb 5-1: Manufacturer: syz [ 1027.091084][T12059] usb 3-1: string descriptor 0 read error: -22 [ 1027.093786][ T8301] usb 5-1: SerialNumber: syz [ 1027.100377][T12059] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1027.114058][T12059] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 09:40:08 executing program 4: syz_usb_connect(0x0, 0xe9, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x96, 0x46, 0x13, 0x40, 0x1b3d, 0x118, 0x9faa, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xd7, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0xb9, 0x37, 0x78, 0x0, [], [{{0x9, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, [@generic={0xb5, 0x21, "5d9a1639636c9daef07db36ef99dadf5cf1b9787f15c8a542d26956d9883eebbe9232b3de0f034d642e43c4712e817a4597c65e40adcb33a5e947976cf88e7e63fa2ac5e8e9fb39a50ddb5471096e113345a7611cdcc3938d76fd778094e86ba4a27f0fd614f2d9a7b2ff690cd448ae0073ff80bfb23f58133bdcac29e4ad5a159a8aa261715da59c6dfce386ef9681b6021870c21eade5fcadd60386e410b4a5c016c459dc88584d4f87edce1368c9f85cada"}, @uac_iso={0x7, 0x25, 0x1, 0x0, 0xfb}]}}]}}]}}]}}, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x4, [{0x4, &(0x7f0000000380)=@lang_id={0x4, 0x3, 0x816}}, {0x0, 0x0}, {0x0, 0x0}, {0x31, &(0x7f0000000900)=ANY=[@ANYBLOB="3103e6e2a9612949f669faf3ac2e1043a0e13c0c0bb7904a987073df924ec8a9de4a4a07cf5f28840f8d1cc2bad0448d23b61f93c0f9137cb38bde472720a0eff7884585964ba877e10190d9a06b80eedd52c15481334e1d81cbd9b9607012fe282887b8d9fa683155b683deb334599f9ba82aaf547a5c25cf01295c1581480ccb448e144f3a194aff2c73421423915eeb5003e0d38c2d78fe23e9b213925c3cf5c070f3bb9b528098468d95cfe3608c71eee7a7357cfba9924d3e8cddcefcfea8c07518a6f7ef1980"]}]}) 09:40:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:08 executing program 3: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000000)={{0x12, 0x1, 0x250, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}) 09:40:08 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/crypto\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) 09:40:08 executing program 1: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) syz_usb_connect(0x2, 0x34, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0x15, 0x54, 0xc4, 0x40, 0xdf6, 0x61, 0xffa0, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0xd0, 0x5a, 0x1, 0x29, 0xb0, 0x9b, 0x8, [], [{{0x9, 0x5, 0x4, 0x0, 0x8, 0x0, 0x8, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x1}]}}]}}]}}]}}, &(0x7f0000000400)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x0, 0x1, 0x8, 0x4, 0x10, 0xff}, 0x5, &(0x7f0000000080)={0x5, 0xf, 0x5}, 0x5, [{0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x2, &(0x7f00000002c0)=@string={0x2}}, {0x0, 0x0}]}) [ 1027.331683][ T8301] usb 5-1: config 0 descriptor?? [ 1027.356276][ T8301] usb 5-1: can't set config #0, error -71 [ 1027.414639][T12059] cdc_ether: probe of 3-1:1.0 failed with error -22 [ 1027.426963][ T8301] usb 5-1: USB disconnect, device number 9 [ 1027.605358][T12059] usb 3-1: USB disconnect, device number 6 09:40:08 executing program 0: mount$cgroup(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000100)) [ 1027.818494][T12725] usb 2-1: new full-speed USB device number 5 using dummy_hcd 09:40:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a4") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) [ 1027.918776][T11603] usb 4-1: new high-speed USB device number 6 using dummy_hcd [ 1028.128935][ T8329] usb 5-1: new high-speed USB device number 10 using dummy_hcd [ 1028.167753][T12725] usb 2-1: not running at top speed; connect to a high speed hub [ 1028.168862][T11603] usb 4-1: Using ep0 maxpacket: 16 [ 1028.251312][T12725] usb 2-1: config 0 has an invalid interface number: 208 but max is 0 [ 1028.259789][T12725] usb 2-1: config 0 has no interface number 0 [ 1028.266314][T12725] usb 2-1: config 0 interface 208 has no altsetting 0 [ 1028.348748][T11603] usb 4-1: unable to get BOS descriptor or descriptor too short 09:40:09 executing program 0: syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0xac302) [ 1028.430343][T11603] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1028.441684][T11603] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1028.451972][T11603] usb 4-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 1028.462181][T11603] usb 4-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 1028.472325][T11603] usb 4-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 1028.482390][T11603] usb 4-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 [ 1028.492844][ T8301] usb 3-1: new high-speed USB device number 7 using dummy_hcd [ 1028.531876][T12725] usb 2-1: string descriptor 0 read error: -22 [ 1028.538684][T12725] usb 2-1: New USB device found, idVendor=0df6, idProduct=0061, bcdDevice=ff.a0 [ 1028.547900][T12725] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 09:40:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a4") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) [ 1028.598919][ T8329] usb 5-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 1028.703595][T12725] usb 2-1: config 0 descriptor?? [ 1028.901754][ T8301] usb 3-1: unable to get BOS descriptor or descriptor too short [ 1028.954222][T11603] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1028.959810][T12725] usb 2-1: USB disconnect, device number 5 [ 1028.963713][T11603] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1028.977851][T11603] usb 4-1: Product: syz [ 1028.982426][T11603] usb 4-1: Manufacturer: syz [ 1028.987156][T11603] usb 4-1: SerialNumber: syz 09:40:10 executing program 2: syz_open_dev$usbmon(&(0x7f0000000000), 0x80000001, 0x0) [ 1029.190115][ T8301] usb 3-1: unable to read config index 0 descriptor/start: -71 [ 1029.197967][ T8301] usb 3-1: can't read configurations, error -71 09:40:10 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) [ 1029.250907][ T8329] usb 5-1: New USB device found, idVendor=1b3d, idProduct=0118, bcdDevice=9f.aa [ 1029.260333][ T8329] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1029.269167][ T8329] usb 5-1: SerialNumber: 憩䤩槶⺬䌐఼뜋䪐炘互꧈䫞݊忏萨贏순킺资 [ 1029.426158][ T8329] usb 5-1: config 0 descriptor?? [ 1029.469444][T11603] cdc_ncm 4-1:1.0: bind() failure [ 1029.536684][ T8329] ftdi_sio 5-1:0.0: FTDI USB Serial Device converter detected [ 1029.539979][T11603] cdc_ncm 4-1:1.1: CDC Union missing and no IAD found [ 1029.546314][ T8329] usb 5-1: Detected FT-X [ 1029.551399][T11603] cdc_ncm 4-1:1.1: bind() failure 09:40:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockname(r0, 0x0, &(0x7f0000000580)) [ 1029.741792][T11603] usb 4-1: USB disconnect, device number 6 [ 1029.788585][ T8329] ftdi_sio ttyUSB0: Unable to read latency timer: -71 [ 1029.855421][ T8329] ftdi_sio ttyUSB0: Unable to write latency timer: -71 [ 1029.917300][ T8329] ftdi_sio 5-1:0.0: GPIO initialisation failed: -71 [ 1030.012750][ T8329] usb 5-1: FTDI USB Serial Device converter now attached to ttyUSB0 [ 1030.094052][ T8329] usb 5-1: USB disconnect, device number 10 [ 1030.152127][ T8329] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 1030.163335][ T8329] ftdi_sio 5-1:0.0: device disconnected [ 1030.330116][T11603] usb 4-1: new high-speed USB device number 7 using dummy_hcd [ 1030.569729][T11603] usb 4-1: Using ep0 maxpacket: 16 [ 1030.639868][ T8329] usb 5-1: new high-speed USB device number 11 using dummy_hcd [ 1030.728799][T11603] usb 4-1: unable to get BOS descriptor or descriptor too short [ 1030.810644][T11603] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1030.821981][T11603] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1030.832570][T11603] usb 4-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 1030.842689][T11603] usb 4-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 1030.852894][T11603] usb 4-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 1030.865479][T11603] usb 4-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 [ 1031.050556][ T8329] usb 5-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 1031.139716][T11603] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1031.149298][T11603] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1031.238914][T11603] usb 4-1: can't set config #1, error -71 [ 1031.261138][T11603] usb 4-1: USB disconnect, device number 7 09:40:12 executing program 4: fspick(0xffffffffffffffff, &(0x7f0000005c40)='./file0\x00', 0x0) 09:40:12 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a4") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:12 executing program 2: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) 09:40:12 executing program 1: syz_mount_image$fuse(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 09:40:12 executing program 0: select(0x40, &(0x7f0000000100), &(0x7f0000000140), 0x0, &(0x7f00000001c0)={0x77359400}) 09:40:12 executing program 3: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}, {[], {}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x0, 0x1}}}}}]}}]}}, 0x0) [ 1031.435190][ T8329] usb 5-1: New USB device found, idVendor=1b3d, idProduct=0118, bcdDevice=9f.aa [ 1031.444900][ T8329] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1031.582140][ T8329] usb 5-1: config 0 descriptor?? [ 1031.600574][ T8329] usb 5-1: can't set config #0, error -71 09:40:12 executing program 2: ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x1f) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000240)={'syztnl2\x00', &(0x7f0000000180)={'gre0\x00', 0x0, 0x7, 0x0, 0x0, 0x0, {{0xf, 0x4, 0x2, 0x0, 0x3c, 0x64, 0x0, 0x0, 0x0, 0x0, @loopback, @rand_addr, {[@timestamp_prespec={0x44, 0x24, 0x37, 0x3, 0x0, [{@rand_addr=0x64010101}, {@private=0xa010100}, {@loopback}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xf10}]}, @noop]}}}}}) getgroups(0x3, &(0x7f0000000a00)=[0xee01, 0x0, 0x0]) syz_mount_image$f2fs(&(0x7f0000000a40), &(0x7f0000000a80)='./file0\x00', 0x101, 0x4, &(0x7f0000000d40)=[{0x0, 0x0, 0xffff}, {0x0}, {0x0, 0x0, 0x9}, {0x0}], 0x0, &(0x7f0000000dc0)={[{@noinline_xattr}, {@extent_cache}]}) [ 1031.689261][ T8329] usb 5-1: USB disconnect, device number 11 09:40:13 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) ioctl$KDSKBENT(r0, 0x4b47, 0x0) 09:40:13 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 09:40:13 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:13 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = eventfd(0x3) read$eventfd(r0, &(0x7f00000000c0), 0x8) [ 1031.978904][T11603] usb 4-1: new high-speed USB device number 8 using dummy_hcd [ 1032.256803][T14456] loop2: detected capacity change from 0 to 255 09:40:13 executing program 0: bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1032.341284][T14456] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1032.349410][T14456] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 1032.379202][T11603] usb 4-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1032.423488][T14456] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1032.431616][T14456] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 1032.603946][T11603] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1032.613475][T11603] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1032.621912][T11603] usb 4-1: Product: syz [ 1032.626206][T11603] usb 4-1: Manufacturer: syz [ 1032.631316][T11603] usb 4-1: SerialNumber: syz 09:40:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0, 0xd0}}, 0x0) 09:40:13 executing program 1: socketpair(0x8, 0x0, 0x0, &(0x7f00000000c0)) 09:40:14 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:14 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000001900), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000001a80)={0x0, 0x0}) [ 1032.854136][T14437] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1032.914479][T11603] cdc_ether: probe of 4-1:1.0 failed with error -22 09:40:14 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) [ 1033.162550][T11603] usb 4-1: USB disconnect, device number 8 [ 1033.948614][ T8329] usb 4-1: new high-speed USB device number 9 using dummy_hcd [ 1034.368818][ T8329] usb 4-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 09:40:15 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f0000001480)=[{0x0, 0x0, 0x3f}, {&(0x7f0000000300)="d7", 0x1}], 0x0, 0x0) 09:40:15 executing program 4: pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x8ed}, &(0x7f0000000140)={0x0, 0x989680}, 0x0) 09:40:15 executing program 1: syz_mount_image$fuse(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}}) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140), 0x2, 0x0) 09:40:15 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fspick(r0, &(0x7f0000000000)='./file0\x00', 0x0) 09:40:15 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:15 executing program 0: pselect6(0x40, &(0x7f0000000140), 0x0, &(0x7f00000001c0)={0x30}, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={[0x80]}, 0x8}) [ 1034.650016][ T8329] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1034.659429][ T8329] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1034.667577][ T8329] usb 4-1: Product: syz [ 1034.672158][ T8329] usb 4-1: Manufacturer: syz [ 1034.869135][ T8329] usb 4-1: can't set config #1, error -71 [ 1034.904673][ T8329] usb 4-1: USB disconnect, device number 9 [ 1034.943129][T14509] fuse: Bad value for 'fd' [ 1035.003464][T14509] fuse: Bad value for 'fd' 09:40:16 executing program 2: syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x683) 09:40:16 executing program 4: clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) pselect6(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000240)={0x0, r0+60000000}, &(0x7f00000002c0)={&(0x7f0000000280)={[0x80]}, 0x8}) 09:40:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:16 executing program 1: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f0000000000)={'tunl0\x00', 0x0, 0x40, 0x1, 0x7fffffff, 0x5, {{0x6, 0x4, 0x1, 0xc, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @empty, {[@noop, @generic={0x7, 0x2}]}}}}}) socket(0x26, 0x0, 0x3) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) 09:40:16 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002fc0)={0x18, 0x2, &(0x7f0000002c00)=@raw=[@call, @jmp], &(0x7f0000002c40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:40:17 executing program 2: fsmount(0xffffffffffffffff, 0x0, 0x0) fork() 09:40:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[], [{@measure}]}) 09:40:17 executing program 4: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x101040) 09:40:17 executing program 1: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}, {[], {}, {{0x9, 0x5, 0x3, 0x2, 0x400}}}}}]}}]}}, 0x0) 09:40:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:17 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x400c630f, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 09:40:17 executing program 2: syz_io_uring_setup(0x0, &(0x7f0000000480), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff0000/0x10000)=nil, 0x0, 0x0) 09:40:17 executing program 0: stat(&(0x7f0000001100)='./file0\x00', 0x0) 09:40:17 executing program 4: link(&(0x7f0000006480)='./file0\x00', 0x0) [ 1036.618104][T14553] binder: 14549:14553 unknown command 0 [ 1036.624078][T14553] binder: 14549:14553 ioctl c0306201 200003c0 returned -22 09:40:18 executing program 3: syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x15, 0x54, 0xc4, 0x40, 0xdf6, 0x61, 0xffa0, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x29, 0xb0, 0x9b}}]}}]}}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x0, 0x0}]}) 09:40:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) [ 1036.878653][ T8329] usb 2-1: new high-speed USB device number 6 using dummy_hcd 09:40:18 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clock_gettime(0x5, &(0x7f0000000000)) 09:40:18 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='svcsock_new_socket\x00'}, 0x10) 09:40:18 executing program 4: syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000d40)=[{&(0x7f0000000ac0)="6d92", 0x2, 0xffff}], 0x0, 0x0) [ 1037.249477][ T8329] usb 2-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1037.430149][ T8329] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1037.439630][ T8329] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1037.447886][ T8329] usb 2-1: Product: syz [ 1037.452596][ T8329] usb 2-1: Manufacturer: syz [ 1037.457326][ T8329] usb 2-1: SerialNumber: syz 09:40:18 executing program 2: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f00000000c0)={{0x12, 0x1, 0x250, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}, {[], {{0x9, 0x5, 0x82, 0x2, 0x20, 0x0, 0x0, 0xaf}}}}}]}}]}}, &(0x7f0000000440)={0x0, 0x0, 0x10, &(0x7f0000000200)={0x5, 0xf, 0x10, 0x1, [@wireless={0xb, 0x10, 0x1, 0x0, 0x4}]}, 0x1, [{0x2, &(0x7f0000000240)=@string={0x2}}]}) [ 1037.638067][T14550] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1037.655843][T12725] usb 4-1: new high-speed USB device number 10 using dummy_hcd [ 1037.722590][ T8329] cdc_ether: probe of 2-1:1.0 failed with error -22 [ 1037.757739][T14580] loop4: detected capacity change from 0 to 255 [ 1037.889469][T14580] loop4: detected capacity change from 0 to 255 [ 1037.937932][T11603] usb 2-1: USB disconnect, device number 6 [ 1038.341223][T12725] usb 4-1: string descriptor 0 read error: -22 [ 1038.347751][T12725] usb 4-1: New USB device found, idVendor=0df6, idProduct=0061, bcdDevice=ff.a0 [ 1038.357514][T12725] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1038.459059][T11928] usb 3-1: new high-speed USB device number 9 using dummy_hcd [ 1038.463023][T12725] usb 4-1: config 0 descriptor?? [ 1038.709096][ T8301] usb 2-1: new high-speed USB device number 7 using dummy_hcd [ 1038.724269][T12725] usb 4-1: USB disconnect, device number 10 [ 1038.900830][T11928] usb 3-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 32 [ 1038.911167][T11928] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x3 has invalid wMaxPacketSize 0 [ 1038.921512][T11928] usb 3-1: config 1 interface 0 altsetting 0 bulk endpoint 0x3 has invalid maxpacket 0 [ 1038.984398][T11928] usb 3-1: language id specifier not provided by device, defaulting to English [ 1039.100403][ T8301] usb 2-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1039.114393][T11928] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1039.123944][T11928] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1039.132561][T11928] usb 3-1: Product: syz [ 1039.136954][T11928] usb 3-1: Manufacturer: syz [ 1039.141899][T11928] usb 3-1: SerialNumber: syz [ 1039.243478][T14594] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1039.311124][ T8301] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1039.321022][ T8301] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1039.329473][ T8301] usb 2-1: Product: syz [ 1039.333775][ T8301] usb 2-1: Manufacturer: syz [ 1039.339037][ T8301] usb 2-1: SerialNumber: syz [ 1039.347866][T11928] cdc_ether: probe of 3-1:1.0 failed with error -22 09:40:20 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000040)='(&(\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff) 09:40:20 executing program 0: syz_open_dev$usbmon(&(0x7f0000000080), 0x3, 0x88000) 09:40:20 executing program 4: syz_open_dev$loop(&(0x7f0000000000), 0x0, 0xc080) 09:40:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) [ 1039.450224][ T8301] usb 2-1: can't set config #1, error -71 [ 1039.462887][ T8301] usb 2-1: USB disconnect, device number 7 [ 1039.549678][T12725] usb 3-1: USB disconnect, device number 9 [ 1039.571561][ T1002] usb 4-1: new high-speed USB device number 11 using dummy_hcd 09:40:21 executing program 0: socket$inet6(0xa, 0x0, 0x37496163) 09:40:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000007c0)={0x0, @nl, @nfc, @isdn}) [ 1040.180670][ T1002] usb 4-1: string descriptor 0 read error: -22 [ 1040.187191][ T1002] usb 4-1: New USB device found, idVendor=0df6, idProduct=0061, bcdDevice=ff.a0 [ 1040.196850][ T1002] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 09:40:21 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2}}, 0x26) 09:40:21 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:21 executing program 0: eventfd(0x0) eventfd(0x0) 09:40:21 executing program 1: mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) [ 1040.323858][ T1002] usb 4-1: config 0 descriptor?? [ 1040.369576][ T1002] usb 4-1: can't set config #0, error -71 [ 1040.393497][T11928] usb 3-1: new high-speed USB device number 10 using dummy_hcd [ 1040.436551][ T1002] usb 4-1: USB disconnect, device number 11 09:40:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001540)) [ 1040.840258][T11928] usb 3-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 32 [ 1040.850569][T11928] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x3 has invalid wMaxPacketSize 0 [ 1040.860819][T11928] usb 3-1: config 1 interface 0 altsetting 0 bulk endpoint 0x3 has invalid maxpacket 0 [ 1041.071029][T11928] usb 3-1: language id specifier not provided by device, defaulting to English 09:40:22 executing program 2: lchown(0x0, 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)) 09:40:22 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2, 0x0, 0x0, 0x4}}, 0x26) 09:40:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:22 executing program 3: select(0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) 09:40:22 executing program 0: syz_mount_image$f2fs(&(0x7f0000000a40), 0x0, 0x101, 0x0, &(0x7f0000000d40), 0x0, &(0x7f0000000dc0)) getsockopt$TIPC_NODE_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x83, 0x0, 0x0) [ 1041.164671][T14659] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1041.279068][T11928] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1041.288444][T11928] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1041.313221][T14659] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1041.398908][T11928] usb 3-1: can't set config #1, error -71 09:40:22 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) recvmmsg(r0, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1041.494955][T11928] usb 3-1: USB disconnect, device number 10 09:40:22 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x55, &(0x7f00000000c0)={{0x12, 0x1, 0x250, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x43, 0x1, 0x1, 0x0, 0x90, 0x3, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x2, 0x6, 0x0, 0x1, {{0x5}, {0x5, 0x24, 0x0, 0xf6}, {0xd, 0x24, 0xf, 0x1, 0x2}, [@acm={0x4}, @mdlm_detail={0x4, 0x24, 0x13, 0x40}]}, {[], {{0x9, 0x5, 0x82, 0x2, 0x20, 0x0, 0x0, 0xaf}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x6, 0x1}}}}}]}}]}}, &(0x7f0000000440)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x0, 0x9, 0x5, 0x80, 0x20}, 0x24, &(0x7f0000000200)={0x5, 0xf, 0x24, 0x3, [@wireless={0xb, 0x10, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3ff}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x0, 0x0, 0xe8, 0x40}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0x0, 0x1}]}, 0x1, [{0x0, 0x0}]}) syz_usb_connect$cdc_ecm(0x1, 0x0, 0x0, 0x0) 09:40:22 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x84000, 0x0) 09:40:23 executing program 0: sched_getaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)) 09:40:23 executing program 2: sync() openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 09:40:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:23 executing program 1: lchown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)) 09:40:23 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 09:40:23 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000001ac0), 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) [ 1042.548632][T12725] usb 5-1: new high-speed USB device number 12 using dummy_hcd 09:40:23 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4, &(0x7f0000001480)=[{&(0x7f00000000c0)="a450d147ff024c8c19f7fd03eb04263194d5b2079330f2cb748cbf66bf523f58f29611dd2b393a9c0a597b1feaf43e", 0x2f, 0x2}, {0x0}, {&(0x7f0000000200)="c9e2240eb685f77630aee999e6283de45f20ce0a6a7f5e05c0421e006b17e3fde9db2d6c219e83e69a1d9b9c01e9ccf186cffc9baff20e8a2e9d71b644273aa28325c1f50333906b2fa8e66bd22cf831be6b89523d6dc7cefaf6f82271c5fc32146dd7358e4b5c2908261b808004046254b9253db1e9031a4e6422f4cc6d3c5369d28f21537dafa77c750be6e54b0eab8002cd52b45a", 0x96, 0x3f}, {&(0x7f0000000480)="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", 0xf05, 0xfc}], 0x1000008, 0x0) 09:40:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:24 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) 09:40:24 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) fork() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) [ 1043.019964][T12725] usb 5-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 32 [ 1043.030262][T12725] usb 5-1: config 1 interface 0 altsetting 0 bulk endpoint 0x3 has invalid maxpacket 1024 [ 1043.086844][T14713] loop2: detected capacity change from 0 to 8 [ 1043.235014][T14713] loop2: detected capacity change from 0 to 8 [ 1043.330526][T12725] usb 5-1: string descriptor 0 read error: -22 [ 1043.337069][T12725] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1043.346597][T12725] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1043.563168][T14696] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1043.600342][T14696] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1043.662882][T12725] usb 5-1: bad CDC descriptors [ 1043.875998][T11928] usb 5-1: USB disconnect, device number 12 [ 1044.658954][ T1002] usb 5-1: new high-speed USB device number 13 using dummy_hcd [ 1045.100647][ T1002] usb 5-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 32 [ 1045.110976][ T1002] usb 5-1: config 1 interface 0 altsetting 0 bulk endpoint 0x3 has invalid maxpacket 1024 09:40:26 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x55, &(0x7f00000000c0)={{0x12, 0x1, 0x250, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x43, 0x1, 0x1, 0x0, 0x90, 0x3, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x2, 0x6, 0x0, 0x1, {{0x5}, {0x5, 0x24, 0x0, 0xf6}, {0xd, 0x24, 0xf, 0x1, 0x2}, [@acm={0x4}, @mdlm_detail={0x4, 0x24, 0x13, 0x40}]}, {[], {{0x9, 0x5, 0x82, 0x2, 0x20, 0x0, 0x0, 0xaf}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x6, 0x1}}}}}]}}]}}, &(0x7f0000000440)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x0, 0x9, 0x5, 0x80, 0x20}, 0x24, &(0x7f0000000200)={0x5, 0xf, 0x24, 0x3, [@wireless={0xb, 0x10, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3ff}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x0, 0x0, 0xe8, 0x40}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0x0, 0x1}]}, 0x1, [{0x0, 0x0}]}) syz_usb_connect$cdc_ecm(0x1, 0x0, 0x0, 0x0) 09:40:26 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:26 executing program 0: mmap$IORING_OFF_CQ_RING(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x4, 0xfb9a30a9eb8ac476, 0xffffffffffffffff, 0x8000000) 09:40:26 executing program 1: mmap(&(0x7f0000fef000/0x2000)=nil, 0x2000, 0x0, 0x30, 0xffffffffffffffff, 0x0) 09:40:26 executing program 2: socket$nl_route(0x10, 0x3, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) r0 = fork() getpgrp(r0) getpgrp(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) syz_open_procfs$namespace(r1, &(0x7f0000000140)='ns/time\x00') sched_rr_get_interval(0x0, &(0x7f0000000040)) 09:40:26 executing program 3: syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0x15, 0x54, 0xc4, 0x40, 0xdf6, 0x61, 0xffa0, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0xf7, 0x0, 0x0, 0x6, [{{0x9, 0x4, 0x0, 0x5a, 0x0, 0x29, 0xb0, 0x9b}}]}}]}}, 0x0) [ 1045.258703][ T1002] usb 5-1: string descriptor 0 read error: -71 [ 1045.265227][ T1002] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1045.274912][ T1002] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1045.442750][ T1002] usb 5-1: can't set config #1, error -71 09:40:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000013c0), 0x0, &(0x7f0000001480)={[{@shortname_mixed}, {@shortname_winnt}], [{@smackfstransmute={'smackfstransmute', 0x3d, '-\\!'}}]}) [ 1045.526262][ T1002] usb 5-1: USB disconnect, device number 13 09:40:26 executing program 0: select(0x40, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)={0x9253, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x8}, &(0x7f00000001c0)={0x77359400}) [ 1045.748710][T12725] usb 4-1: new high-speed USB device number 12 using dummy_hcd 09:40:27 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:27 executing program 2: mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) [ 1046.120602][T12725] usb 4-1: config 247 interface 0 has no altsetting 0 [ 1046.131214][ T1002] usb 5-1: new high-speed USB device number 14 using dummy_hcd 09:40:27 executing program 0: capset(&(0x7f0000000140)={0x19980330}, &(0x7f0000000180)={0xfffffe01}) [ 1046.311397][T12725] usb 4-1: New USB device found, idVendor=0df6, idProduct=0061, bcdDevice=ff.a0 [ 1046.322587][T12725] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1046.331270][T12725] usb 4-1: Product: syz [ 1046.335616][T12725] usb 4-1: Manufacturer: syz [ 1046.340517][T12725] usb 4-1: SerialNumber: syz [ 1046.374921][T14785] FAT-fs (loop1): Unrecognized mount option "smackfstransmute=-\!" or missing value 09:40:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6, &(0x7f0000001480)=[{&(0x7f0000000080)}, {0x0, 0x0, 0x2}, {0x0}, {&(0x7f0000000380), 0x0, 0x8}, {&(0x7f0000000440)="5e1346483de5dc35c4e6c1f2f64b288ad1a9fc", 0x13, 0x400}, {&(0x7f0000000480)="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", 0xfdc, 0xfc}], 0x1000008, &(0x7f0000001540)={[{@auto_da_alloc}, {@nomblk_io_submit}], [{@smackfstransmute}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '\'\xdc$%\\@\\\x14,'}}, {@dont_appraise}, {@measure}]}) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) [ 1046.538998][T14785] FAT-fs (loop1): Unrecognized mount option "smackfstransmute=-\!" or missing value [ 1046.589083][ T1002] usb 5-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 32 [ 1046.599438][ T1002] usb 5-1: config 1 interface 0 altsetting 0 bulk endpoint 0x3 has invalid maxpacket 1024 [ 1046.656153][T12725] usb 4-1: USB disconnect, device number 12 [ 1046.787103][T14804] capability: warning: `syz-executor.0' uses 32-bit capabilities (legacy support in use) [ 1046.880132][ T1002] usb 5-1: string descriptor 0 read error: -22 [ 1046.886848][ T1002] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1046.896557][ T1002] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1047.001435][T14807] loop2: detected capacity change from 0 to 8 [ 1047.032698][T14777] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1047.065813][T14777] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1047.095184][T14807] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1047.131695][ T1002] usb 5-1: bad CDC descriptors [ 1047.215872][T14807] loop2: detected capacity change from 0 to 8 [ 1047.254173][T14807] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1047.421735][T11928] usb 5-1: USB disconnect, device number 14 [ 1047.489362][T12725] usb 4-1: new high-speed USB device number 13 using dummy_hcd [ 1047.910548][T12725] usb 4-1: config 247 interface 0 has no altsetting 0 09:40:29 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x55, &(0x7f00000000c0)={{0x12, 0x1, 0x250, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x43, 0x1, 0x1, 0x0, 0x90, 0x3, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x2, 0x6, 0x0, 0x1, {{0x5}, {0x5, 0x24, 0x0, 0xf6}, {0xd, 0x24, 0xf, 0x1, 0x2}, [@acm={0x4}, @mdlm_detail={0x4, 0x24, 0x13, 0x40}]}, {[], {{0x9, 0x5, 0x82, 0x2, 0x20, 0x0, 0x0, 0xaf}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x6, 0x1}}}}}]}}]}}, &(0x7f0000000440)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x0, 0x9, 0x5, 0x80, 0x20}, 0x24, &(0x7f0000000200)={0x5, 0xf, 0x24, 0x3, [@wireless={0xb, 0x10, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3ff}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x0, 0x0, 0xe8, 0x40}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0x0, 0x1}]}, 0x1, [{0x0, 0x0}]}) syz_usb_connect$cdc_ecm(0x1, 0x0, 0x0, 0x0) 09:40:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:29 executing program 1: syz_usb_connect(0x0, 0x3d, &(0x7f00000006c0)={{0x12, 0x1, 0x0, 0x74, 0x49, 0x9d, 0x20, 0x13d8, 0x11, 0x484, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0xe4, 0x38, 0xc, 0x0, [], [{{0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x0, 0x9}]}}, {}]}}]}}]}}, 0x0) 09:40:29 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 09:40:29 executing program 2: clock_gettime(0x0, &(0x7f0000000200)={0x0}) pselect6(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000240)={r0}, &(0x7f00000002c0)={&(0x7f0000000280)={[0x80]}, 0x8}) [ 1048.079311][T12725] usb 4-1: New USB device found, idVendor=0df6, idProduct=0061, bcdDevice=ff.a0 [ 1048.088650][T12725] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1048.096802][T12725] usb 4-1: Product: syz [ 1048.101364][T12725] usb 4-1: Manufacturer: syz [ 1048.106099][T12725] usb 4-1: SerialNumber: syz 09:40:29 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fsmount(r0, 0x0, 0x6) [ 1048.409430][T12725] usb 4-1: can't set config #247, error -71 [ 1048.431476][T12725] usb 4-1: USB disconnect, device number 13 09:40:29 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) [ 1048.559488][T11928] usb 2-1: new high-speed USB device number 8 using dummy_hcd 09:40:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) [ 1048.807042][T11928] usb 2-1: Using ep0 maxpacket: 32 [ 1048.859090][ T8329] usb 5-1: new high-speed USB device number 15 using dummy_hcd [ 1048.959329][T11928] usb 2-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 1048.970163][T11928] usb 2-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping 09:40:30 executing program 3: syz_usb_connect(0x2, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0x15, 0x54, 0xc4, 0x40, 0xdf6, 0x61, 0xffa0, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x29, 0xb0, 0x9b}}]}}]}}, &(0x7f0000000400)={0xa, &(0x7f0000000040)={0xa}, 0x0, 0x0, 0x1, [{0x0, 0x0}]}) 09:40:30 executing program 2: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x20}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x20}}}}}}}]}}, 0x0) [ 1049.195102][T11928] usb 2-1: New USB device found, idVendor=13d8, idProduct=0011, bcdDevice= 4.84 [ 1049.204837][T11928] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1049.213415][T11928] usb 2-1: Product: syz [ 1049.217712][T11928] usb 2-1: Manufacturer: syz [ 1049.222768][T11928] usb 2-1: SerialNumber: syz 09:40:30 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6, &(0x7f0000001480)=[{0x0}, {0x0}, {&(0x7f0000000200)="c9e2240eb685f77630aee999e6283de45f20ce0a6a7f5e05c0421e006b17e3fde9db2d6c219e83e69a1d9b9c01e9ccf186cffc9baff20e8a2e9d71b644273aa28325c1f50333906b2fa8e66bd22cf831be6b89523d6dc7cefaf6f82271c5fc32146dd7358e4b5c2908261b808004046254b9253db1e9031a4e6422f4cc6d3c5369d28f21537dafa77c750be6e54b0eab8002cd52b45aca54d83fbc0da30a74ffaf4576d1f6aec22cfff1fd4d8ac0a7aced6bef6fae0c5d6d55159181e331937d128f1d20b61385502c2e", 0xca, 0x3f}, {&(0x7f0000000300)="d77142cd22d3424f33fd49e1c69c7092b115973507629ef6fce124d10d4647ec8ade393898d38b67b8e9fa876d3fa061bd263857636cd55ab1990b431d1ca50b295316189ea14c203eab344d61931837a684502ae1f9c56a5e0558df98cc0ac75513d67037e885ebef415321812e430b", 0x70}, {&(0x7f0000000440)="5e1346483de5dc35c4e6c1f2f64b288ad1a9", 0x12, 0x400}, {&(0x7f0000000480)="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", 0xf7e, 0xfc}], 0x1000008, &(0x7f0000001540)={[{@auto_da_alloc}, {@nobh}, {@nomblk_io_submit}], [{@smackfstransmute}, {@uid_lt={'uid<', 0xee00}}, {@fsname={'fsname', 0x3d, '\'\xdc$%\\@\\\x14,'}}, {@dont_appraise}, {@measure}, {@smackfsroot={'smackfsroot', 0x3d, '@'}}]}) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000002f40), 0x0, 0x0) fspick(r0, 0x0, 0x0) [ 1049.308999][ T8329] usb 5-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 32 [ 1049.319132][ T8329] usb 5-1: config 1 interface 0 altsetting 0 bulk endpoint 0x3 has invalid maxpacket 1024 09:40:30 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) [ 1049.426943][T11928] usb 2-1: config 0 descriptor?? [ 1049.538049][T11928] usb 2-1: selecting invalid altsetting 1 [ 1049.544124][T11928] comedi comedi0: could not switch to alternate setting 1 [ 1049.551663][T11928] usbduxfast 2-1:0.0: driver 'usbduxfast' failed to auto-configure device. [ 1049.650204][ T8329] usb 5-1: string descriptor 0 read error: -22 [ 1049.656737][ T8329] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1049.666383][ T8329] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1049.732064][T11928] usb 2-1: USB disconnect, device number 8 [ 1049.823814][T14850] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1049.869389][ T1002] usb 4-1: new full-speed USB device number 14 using dummy_hcd [ 1049.873173][T14850] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1049.941619][ T8329] usb 5-1: bad CDC descriptors [ 1050.058662][T12725] usb 3-1: new high-speed USB device number 11 using dummy_hcd [ 1050.210278][ T1002] usb 4-1: not running at top speed; connect to a high speed hub [ 1050.277573][ T8329] usb 5-1: USB disconnect, device number 15 [ 1050.308833][T12725] usb 3-1: Using ep0 maxpacket: 16 [ 1050.430576][T12725] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1050.441902][T12725] usb 3-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 32 [ 1050.452403][T12725] usb 3-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 1050.462413][T12725] usb 3-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 [ 1050.468028][T11928] usb 2-1: new high-speed USB device number 9 using dummy_hcd [ 1050.568796][ T1002] usb 4-1: string descriptor 0 read error: -22 [ 1050.575490][ T1002] usb 4-1: New USB device found, idVendor=0df6, idProduct=0061, bcdDevice=ff.a0 [ 1050.585060][ T1002] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1050.661808][ T1002] usb 4-1: config 0 descriptor?? [ 1050.690783][T12725] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1050.700363][T12725] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1050.708651][T12725] usb 3-1: Product: syz [ 1050.713044][T12725] usb 3-1: Manufacturer: syz [ 1050.717771][T12725] usb 3-1: SerialNumber: syz [ 1050.734459][T11928] usb 2-1: Using ep0 maxpacket: 32 [ 1050.860847][T11928] usb 2-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 1050.871691][T11928] usb 2-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping 09:40:32 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x55, &(0x7f00000000c0)={{0x12, 0x1, 0x250, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x43, 0x1, 0x1, 0x0, 0x90, 0x3, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x2, 0x6, 0x0, 0x1, {{0x5}, {0x5, 0x24, 0x0, 0xf6}, {0xd, 0x24, 0xf, 0x1, 0x2}, [@acm={0x4}, @mdlm_detail={0x4, 0x24, 0x13, 0x40}]}, {[], {{0x9, 0x5, 0x82, 0x2, 0x20, 0x0, 0x0, 0xaf}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x6, 0x1}}}}}]}}]}}, &(0x7f0000000440)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x0, 0x9, 0x5, 0x80, 0x20}, 0x24, &(0x7f0000000200)={0x5, 0xf, 0x24, 0x3, [@wireless={0xb, 0x10, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3ff}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x0, 0x0, 0xe8, 0x40}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0x0, 0x1}]}, 0x1, [{0x0, 0x0}]}) syz_usb_connect$cdc_ecm(0x1, 0x0, 0x0, 0x0) 09:40:32 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000001ac0), 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000001b00)=0x6) [ 1050.939095][ T8329] usb 4-1: USB disconnect, device number 14 [ 1051.061279][T11928] usb 2-1: New USB device found, idVendor=13d8, idProduct=0011, bcdDevice= 4.84 [ 1051.070745][T11928] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1051.079262][T11928] usb 2-1: Product: syz [ 1051.083558][T11928] usb 2-1: Manufacturer: syz [ 1051.088595][T11928] usb 2-1: SerialNumber: syz [ 1051.115290][T12725] cdc_ncm 3-1:1.0: bind() failure [ 1051.132427][T12725] cdc_ncm 3-1:1.1: CDC Union missing and no IAD found [ 1051.139482][T12725] cdc_ncm 3-1:1.1: bind() failure [ 1051.187027][T11928] usb 2-1: config 0 descriptor?? 09:40:32 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000001d40)={0x0, @llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, @ethernet={0x0, @local}, @phonet}) 09:40:32 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x5, 0x6, &(0x7f0000001480)=[{&(0x7f00000000c0), 0x0, 0x2}, {&(0x7f00000001c0)="65aeeeea4bc28ac213c40bbaa7ad734469b7a92a2cb6d8f1a24c370b9bfac07bbbc1cf19e7403698352aeeefd676", 0x2e, 0x69e}, {&(0x7f0000000200)="c9e2240eb685f77630aee999e6283de45f20ce0a6a7f5e05c0421e006b17e3fde9db2d6c219e83e69a1d9b9c01e9ccf186cffc9baff20e8a2e9d71b644273aa28325c1f50333906b2fa8e66bd22cf831be6b89523d6dc7cefaf6f82271c5fc32146dd7358e4b5c2908261b808004046254b9253db1e9031a4e6422f4cc6d3c5369d28f21537dafa77c750be6e54b0eab8002cd52b45aca54d83fbc0da30a74ffaf4576d1f6aec22cfff1fd4d8ac0a7aced6bef6fae0c5d6d55159181e331937d128f1d20b61385502c2eb44892ec4e6f5e09b1b6afc52c", 0xd7, 0x3f}, {&(0x7f0000000300)="d77142cd22d3424f33fd49e1c69c7092b115973507629ef6fce124d10d4647ec8ade393898d38b67b8e9fa876d3fa061bd263857636cd55ab1990b431d1ca50b295316189ea14c203eab344d61931837a684502ae1f9c56a5e0558df98cc0ac75513d67037e885ebef415321812e430b47d3", 0x72, 0x3}, {0x0, 0x0, 0x8}, {&(0x7f0000000440)="5e1346483de5dc35c4e6c1f2f64b28", 0xf, 0x400}], 0x0, &(0x7f0000001540)={[{@auto_da_alloc}, {@nobh}, {@nomblk_io_submit}], [{@smackfstransmute}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@uid_lt={'uid<', 0xee00}}, {@fsname={'fsname', 0x3d, '\'\xdc$%\\@\\\x14,'}}, {@dont_appraise}, {@measure}, {@smackfsroot={'smackfsroot', 0x3d, '@'}}]}) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000002f40), 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, 0x0) fspick(r0, 0x0, 0x10) [ 1051.274281][T11928] usb 2-1: can't set config #0, error -71 [ 1051.342874][T12725] usb 3-1: USB disconnect, device number 11 [ 1051.353596][T11928] usb 2-1: USB disconnect, device number 9 [ 1051.529715][ T1002] usb 5-1: new high-speed USB device number 16 using dummy_hcd 09:40:32 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) [ 1051.790518][ T8329] usb 4-1: new full-speed USB device number 15 using dummy_hcd 09:40:33 executing program 1: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f00000000c0)={{0x12, 0x1, 0x250, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, &(0x7f0000000440)={0x0, 0x0, 0x10, &(0x7f0000000200)={0x5, 0xf, 0x10, 0x1, [@wireless={0xb}]}}) 09:40:33 executing program 0: syz_usb_connect$cdc_ecm(0x0, 0x61, &(0x7f0000000040)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x4f, 0x1, 0x1, 0x56, 0x0, 0x4, [{{0x9, 0x4, 0x0, 0xc7, 0x2, 0x2, 0x6, 0x0, 0x1, {{0x5}, {0x5, 0x24, 0x0, 0x6}, {0xd, 0x24, 0xf, 0x1, 0x8, 0x5, 0x8000, 0x7f}, [@dmm={0x7, 0x24, 0x14, 0x5, 0xfffb}, @ncm={0x6, 0x24, 0x1a, 0x1, 0x1}, @dmm={0x7, 0x24, 0x14, 0xf801, 0x81}]}, {[], {{0x9, 0x5, 0x82, 0x2, 0x10, 0x39, 0x97, 0x20}}, {{0x9, 0x5, 0x3, 0x2, 0x40, 0xfd, 0x7}}}}}]}}]}}, &(0x7f0000000180)={0xa, &(0x7f00000000c0)={0xa, 0x6, 0x250, 0x1, 0xff, 0xff, 0x20, 0x3}, 0x21, &(0x7f0000000100)={0x5, 0xf, 0x21, 0x1, [@ssp_cap={0x1c, 0x10, 0xa, 0x1, 0x4, 0x10000, 0xf0f, 0xfeaa, [0x30, 0x0, 0xff0000, 0xc0]}]}, 0x1, [{0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x1007}}]}) [ 1051.970693][ T1002] usb 5-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 32 [ 1051.981073][ T1002] usb 5-1: config 1 interface 0 altsetting 0 bulk endpoint 0x3 has invalid maxpacket 1024 [ 1052.070810][T12725] usb 3-1: new high-speed USB device number 12 using dummy_hcd [ 1052.130578][ T8329] usb 4-1: not running at top speed; connect to a high speed hub [ 1052.251203][ T1002] usb 5-1: string descriptor 0 read error: -22 [ 1052.257741][ T1002] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1052.269817][ T1002] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1052.322592][T12725] usb 3-1: Using ep0 maxpacket: 16 [ 1052.459241][T12725] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1052.472491][T12725] usb 3-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 32 [ 1052.483064][T12725] usb 3-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 1052.493018][T12725] usb 3-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 [ 1052.502738][T14911] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1052.503883][T14911] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1052.671646][T14361] usb 2-1: new high-speed USB device number 10 using dummy_hcd [ 1052.689970][ T8301] usb 1-1: new high-speed USB device number 8 using dummy_hcd 09:40:34 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000001900), 0x0, 0x28a002) ioctl$MON_IOCX_GETX(r0, 0x4018920a, 0x0) [ 1052.721107][ T1002] usb 5-1: bad CDC descriptors [ 1052.724559][ T8329] usb 4-1: string descriptor 0 read error: -71 [ 1052.732569][ T8329] usb 4-1: New USB device found, idVendor=0df6, idProduct=0061, bcdDevice=ff.a0 [ 1052.741900][ T8329] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 09:40:34 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(0x0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:34 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) mprotect(&(0x7f0000800000/0x800000)=nil, 0x800000, 0xa) [ 1052.911088][ T8329] usb 4-1: config 0 descriptor?? [ 1052.940008][ T8301] usb 1-1: Using ep0 maxpacket: 8 [ 1052.974316][ T8329] usb 4-1: can't set config #0, error -71 [ 1053.044517][T11928] usb 5-1: USB disconnect, device number 16 [ 1053.054020][ T8329] usb 4-1: USB disconnect, device number 15 [ 1053.090997][T12725] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1053.100347][T12725] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1053.140426][ T8301] usb 1-1: config 1 interface 0 altsetting 199 bulk endpoint 0x82 has invalid maxpacket 16 [ 1053.150858][ T8301] usb 1-1: config 1 interface 0 altsetting 199 bulk endpoint 0x3 has invalid maxpacket 64 [ 1053.161255][ T8301] usb 1-1: config 1 interface 0 has no altsetting 0 [ 1053.241503][T14361] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 1053.252085][T14361] usb 2-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 0 [ 1053.262191][T14361] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x3 has invalid wMaxPacketSize 0 [ 1053.272224][T14361] usb 2-1: config 1 interface 0 altsetting 0 bulk endpoint 0x3 has invalid maxpacket 0 [ 1053.292205][T12725] usb 3-1: can't set config #1, error -71 [ 1053.343056][T12725] usb 3-1: USB disconnect, device number 12 09:40:34 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(0x0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) [ 1053.470466][ T8301] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1053.480282][ T8301] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1053.491151][ T8301] usb 1-1: Product: syz [ 1053.495809][ T8301] usb 1-1: Manufacturer: syz [ 1053.500706][ T8301] usb 1-1: SerialNumber: syz 09:40:35 executing program 3: syz_open_dev$vcsu(&(0x7f0000000000), 0x0, 0x1) [ 1053.732889][T14943] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1053.769477][T14361] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1053.778830][T14361] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1053.787019][T14361] usb 2-1: Product: syz [ 1053.791495][T14361] usb 2-1: Manufacturer: syz [ 1053.794003][T14943] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1053.796253][T14361] usb 2-1: SerialNumber: syz 09:40:35 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, 0x0, 0x0, 0x0) 09:40:35 executing program 4: openat$dir(0xffffff9c, &(0x7f00000001c0)='./file0\x00', 0x78843, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xe2e3cbdd9cdc9ae7) [ 1054.023105][T14361] cdc_ether: probe of 2-1:1.0 failed with error -22 [ 1054.226107][T14361] usb 2-1: USB disconnect, device number 10 [ 1054.239226][ T8301] cdc_ether: probe of 1-1:1.0 failed with error -71 09:40:35 executing program 3: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000000)={{0x12, 0x1, 0x250, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, &(0x7f0000000200)={0x0, 0x0, 0x5, &(0x7f00000000c0)={0x5, 0xf, 0x5}}) [ 1054.343830][ T8301] usb 1-1: USB disconnect, device number 8 09:40:35 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(0x0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:35 executing program 4: syz_mount_image$fuse(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{}, {@default_permissions}, {@blksize}, {}], [{@seclabel}]}}) [ 1054.938708][T14361] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 1055.035903][T15010] fuse: Bad value for 'fd' [ 1055.049733][T12725] usb 2-1: new high-speed USB device number 11 using dummy_hcd [ 1055.062374][T15010] fuse: Bad value for 'fd' [ 1055.079059][ T8301] usb 4-1: new high-speed USB device number 16 using dummy_hcd [ 1055.200903][T14361] usb 1-1: Using ep0 maxpacket: 8 [ 1055.318607][ T8301] usb 4-1: Using ep0 maxpacket: 16 [ 1055.442147][T14361] usb 1-1: config 1 interface 0 altsetting 199 bulk endpoint 0x82 has invalid maxpacket 16 [ 1055.452556][T14361] usb 1-1: config 1 interface 0 altsetting 199 bulk endpoint 0x3 has invalid maxpacket 64 [ 1055.463074][T14361] usb 1-1: config 1 interface 0 has no altsetting 0 [ 1055.519796][ T8301] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1055.531224][ T8301] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1055.543898][ T8301] usb 4-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 1055.554515][ T8301] usb 4-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 1055.560201][T12725] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 1055.564561][ T8301] usb 4-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 1055.574625][T12725] usb 2-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 0 [ 1055.584095][ T8301] usb 4-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 [ 1055.594074][T12725] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x3 has invalid wMaxPacketSize 0 [ 1055.613547][T12725] usb 2-1: config 1 interface 0 altsetting 0 bulk endpoint 0x3 has invalid maxpacket 0 09:40:37 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_usb_connect(0x2, 0x34, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0x15, 0x54, 0xc4, 0x40, 0xdf6, 0x61, 0xffa0, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x29, 0xb0, 0x9b, 0x8, [], [{{0x9, 0x5, 0x0, 0x0, 0x8, 0x0, 0x8, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x3}]}}]}}]}}]}}, &(0x7f0000000400)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x0, 0x0, 0x0, 0x4, 0x10}, 0x0, 0x0, 0x3, [{0x4, &(0x7f00000000c0)=@lang_id={0x4}}, {0x0, 0x0}, {0x0, 0x0}]}) 09:40:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000013c0), 0x0, &(0x7f0000001480)={[{@shortname_mixed}, {@shortname_winnt}]}) 09:40:37 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:37 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f00000000c0)={{0x12, 0x1, 0x250, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, &(0x7f0000000440)={0x0, 0x0, 0xf, &(0x7f0000000200)={0x5, 0xf, 0xf, 0x1, [@ss_cap={0xa}]}}) [ 1055.739455][T14361] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1055.748768][T14361] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1055.757028][T14361] usb 1-1: Product: syz [ 1055.761578][T14361] usb 1-1: Manufacturer: syz 09:40:37 executing program 0: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1055.791602][ T8301] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1055.801588][ T8301] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1055.810000][ T8301] usb 4-1: Product: syz [ 1055.814294][ T8301] usb 4-1: Manufacturer: syz [ 1055.819214][ T8301] usb 4-1: SerialNumber: syz [ 1055.939322][T14361] usb 1-1: can't set config #1, error -71 [ 1055.996664][T14361] usb 1-1: USB disconnect, device number 9 [ 1056.054309][T12725] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1056.063856][T12725] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1056.123599][T15024] FAT-fs (loop2): bogus number of reserved sectors [ 1056.130864][T15024] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1056.141844][T12725] usb 2-1: can't set config #1, error -71 [ 1056.204996][T12725] usb 2-1: USB disconnect, device number 11 [ 1056.249320][ T8301] cdc_ncm 4-1:1.0: bind() failure [ 1056.268496][ T8329] usb 5-1: new high-speed USB device number 17 using dummy_hcd [ 1056.269826][ T8301] cdc_ncm 4-1:1.1: CDC Union missing and no IAD found [ 1056.281503][T15024] FAT-fs (loop2): bogus number of reserved sectors [ 1056.283174][ T8301] cdc_ncm 4-1:1.1: bind() failure [ 1056.290258][T15024] FAT-fs (loop2): Can't find a valid FAT filesystem 09:40:37 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:37 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) [ 1056.572758][ T8301] usb 4-1: USB disconnect, device number 16 09:40:37 executing program 0: r0 = inotify_init1(0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000001c0), 0x0, 0x0, 0x0) [ 1056.760500][ T8329] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1056.950785][ T8329] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1056.960202][ T8329] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1056.968587][ T8329] usb 5-1: Product: syz [ 1056.974775][ T8329] usb 5-1: Manufacturer: syz [ 1056.979918][ T8329] usb 5-1: SerialNumber: syz [ 1056.986231][T12725] usb 2-1: new full-speed USB device number 12 using dummy_hcd [ 1057.078532][ T8301] usb 4-1: new high-speed USB device number 17 using dummy_hcd [ 1057.202173][ T8329] cdc_ether: probe of 5-1:1.0 failed with error -22 09:40:38 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, 0x0) [ 1057.310260][T12725] usb 2-1: not running at top speed; connect to a high speed hub [ 1057.319967][ T8301] usb 4-1: Using ep0 maxpacket: 16 [ 1057.408874][T12725] usb 2-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 1057.429403][ T8329] usb 5-1: USB disconnect, device number 17 [ 1057.521146][ T8301] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1057.532464][ T8301] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1057.542647][ T8301] usb 4-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 1057.552727][ T8301] usb 4-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 1057.562950][ T8301] usb 4-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 1057.572943][ T8301] usb 4-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 09:40:39 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:39 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000035c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:40:39 executing program 2: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) [ 1057.979636][ T8301] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1057.989155][ T8301] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1058.070735][T12725] usb 2-1: New USB device found, idVendor=0df6, idProduct=0061, bcdDevice=ff.a0 [ 1058.080135][T12725] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1058.088519][T12725] usb 2-1: SerialNumber: syz [ 1058.145327][ T8301] usb 4-1: can't set config #1, error -71 [ 1058.204305][ T8301] usb 4-1: USB disconnect, device number 17 [ 1058.215796][T12725] usb 2-1: config 0 descriptor?? [ 1058.249532][ T8329] usb 5-1: new high-speed USB device number 18 using dummy_hcd [ 1058.533918][T12725] usb 2-1: USB disconnect, device number 12 [ 1058.719578][ T8329] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1058.969399][ T8329] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1058.978910][ T8329] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 09:40:40 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xa, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000009000000006926000000000000bf67000000000000560200000fff07004406000002000000270600000ee60000bf250000000000003d350000000000006507f3ff01000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad53010000000000840400000000000005000000000000009500000000000000db13d5d8b741f2cdaabc83fb2ee602c21a35ee488dceac83c8f56b8c2b84a800301b37276117d86d6798bfd1e06d8c801b6da42f824ad66d17b3f648a7f0ab5fb4db18559e299048c175f18d514bd8307c86847f4642cb3f80a82636fb644e8c1e9ce788891bb30da3e98c71b6ba1afb09659ecda18a32037f9ab1f5829063a26c340890f3f09e1dd3247bdc7ee90ddabbc5ac5589dd85a06388a53e9db4c635ddfe132d326f52b7e2aaa3f200dc34d0e29ae80cbaa9f66310503f56493566c2fbe24aaedabc8e1a242db1ecdc5ee12b64c8b79a6952bd88482ca3a636c684dfa40b7dd8a824d126060edd5a945ef3b858a0b8b0fe24ce5d68916295808e4cf9c56a30b3194b11843dc30c3693772fba43b6907f03289672cb8381ea86cec828c2f501ac4f3a3e9c943d08cf726a0c56404e6c89d46c2e53a94a0f706c2328a4e93f4fdd642e85f9d00018b420d55a"], &(0x7f0000000100)='GPL\x00'}, 0x48) 09:40:40 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, 0x0) 09:40:40 executing program 0: open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000780)) 09:40:40 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf) 09:40:40 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:40 executing program 4: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000002800)={0x0, 0x0, 0x0}, 0x0) [ 1059.029024][ T8329] usb 5-1: can't set config #1, error -71 [ 1059.112136][ T8329] usb 5-1: USB disconnect, device number 18 09:40:40 executing program 0: r0 = fork() wait4(0x0, 0x0, 0x0, &(0x7f0000000540)) tkill(r0, 0xd) 09:40:40 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x4011) 09:40:40 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) 09:40:40 executing program 1: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x486e6ec0fec843db, 0x0) 09:40:40 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:41 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f00000087c0)=[{{0x0, 0x0, &(0x7f0000003580)=[{0x0}, {0x0}], 0x10000018, &(0x7f0000000180)=[@cred={{0x1c}}, @rights={{0x10}}, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred], 0x30}}], 0x1, 0x0) 09:40:41 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, 0x0, &(0x7f0000000100)) 09:40:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, 0x0, &(0x7f0000000200)) 09:40:41 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) sendmsg$GTP_CMD_GETPDP(r0, 0x0, 0x0) 09:40:41 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x1, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) 09:40:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:42 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, 0x0, &(0x7f0000004c00)) 09:40:42 executing program 3: select(0xfffffd1b, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000000)) 09:40:42 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000000c0)) 09:40:42 executing program 0: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001c80)) 09:40:42 executing program 1: socketpair(0x18, 0x0, 0x80000000, 0x0) 09:40:42 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, 0x0, &(0x7f0000004c00)) 09:40:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:43 executing program 3: r0 = inotify_init() ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 09:40:43 executing program 2: socketpair(0x2b, 0x0, 0x0, 0x0) 09:40:43 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800), 0x0, 0x0) read$rfkill(r0, &(0x7f0000001080), 0x8) 09:40:43 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 09:40:43 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, 0x0, &(0x7f0000004c00)) 09:40:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:43 executing program 3: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f000000ef00)={0x77359400}) getresuid(&(0x7f000000ef80), &(0x7f000000efc0), &(0x7f000000f000)) 09:40:43 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f00000002c0)={'sit0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 09:40:44 executing program 0: setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000040), 0xffffffffffffff59) 09:40:44 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 09:40:44 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, 0x0, &(0x7f0000004c00)) 09:40:44 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:44 executing program 3: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000140), 0x26040, 0x0) 09:40:44 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0xb, 0x0, &(0x7f0000000180)) 09:40:44 executing program 1: select(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) clock_getres(0x3, &(0x7f00000002c0)) 09:40:44 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, &(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e) 09:40:45 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x3, 0x0, 0x0, 0xfff}]}) 09:40:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:45 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) getsockname(r0, &(0x7f00000000c0)=@sco={0x1f, @none}, &(0x7f0000000140)=0x80) 09:40:45 executing program 2: clock_gettime(0x0, &(0x7f0000001ec0)) 09:40:45 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f0000019a40), 0x4000, 0x0) 09:40:45 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) recvmmsg$unix(r0, &(0x7f0000002440)=[{{&(0x7f0000000000)=@abs, 0x6e, 0x0}}], 0x1, 0x0, 0x0) 09:40:46 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000020c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 09:40:46 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, 0x0) 09:40:46 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:46 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f000000dfc0)={0x0, 0x0}) 09:40:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={0x0, 0xfffffe6d}}, 0x0) 09:40:46 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(0xffffffffffffffff, &(0x7f0000000a80)={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0x8) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 09:40:47 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000000)) getresuid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) 09:40:47 executing program 0: add_key$user(&(0x7f0000000080), &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="b3", 0x1, 0xffffffffffffffff) 09:40:47 executing program 2: openat$drirender128(0xffffffffffffff9c, &(0x7f0000002280), 0x240441, 0x0) 09:40:47 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x40101, 0x0) 09:40:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:47 executing program 4: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0xc3}, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}, 0x0) 09:40:47 executing program 0: add_key$user(&(0x7f0000000100), 0x0, 0x0, 0x0, 0xfffffffffffffff8) 09:40:48 executing program 1: sched_setparam(0x0, &(0x7f000000d5c0)) 09:40:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:40:48 executing program 2: pselect6(0x40, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}, 0x0) 09:40:48 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x0) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:48 executing program 4: pselect6(0x40, &(0x7f0000000000)={0x81}, 0x0, 0x0, 0x0, 0x0) 09:40:48 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f000000dfc0)={0x1, &(0x7f000000df80)=[{}]}) 09:40:48 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg$unix(r0, &(0x7f0000018440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:40:48 executing program 1: socketpair(0x10, 0x3, 0x3, 0x0) 09:40:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg$unix(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x40) 09:40:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x0) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:49 executing program 0: select(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x7}, &(0x7f00000000c0)={0x1000}, &(0x7f0000000140)) 09:40:49 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000280)={&(0x7f0000000180), 0xfffffea0, &(0x7f0000000200)={&(0x7f00000001c0)={0x34}, 0xfe21}}, 0x0) 09:40:49 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040)={0x1f, @none}, 0x8) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 09:40:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x0) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:50 executing program 4: r0 = getpgid(0x0) sched_setparam(r0, &(0x7f0000000000)=0x8d) 09:40:50 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'syztnl0\x00', 0x0}) 09:40:50 executing program 0: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, 0x0) 09:40:50 executing program 2: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000bd80)) 09:40:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$unix(r0, 0x0, 0x0, 0x0) 09:40:51 executing program 4: getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, &(0x7f0000001100)) getrlimit(0x0, &(0x7f0000001140)) 09:40:51 executing program 2: openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x84000, 0x0) 09:40:51 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) socket$inet(0x2, 0xa, 0x0) 09:40:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r1 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r1, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:51 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000240)) 09:40:51 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, 0x0) 09:40:52 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040)={0x1f, @none}, 0x8) connect$bt_sco(r0, &(0x7f0000000000)={0x1f, @none}, 0x8) 09:40:52 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) getsockname(r0, 0x0, 0x0) 09:40:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) 09:40:52 executing program 1: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x4}, &(0x7f00000000c0)={0x0, 0x3938700}, 0x0) 09:40:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r1 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r1, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:52 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 09:40:52 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) recvmsg$unix(r0, 0x0, 0x0) 09:40:52 executing program 0: select(0x30, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)) 09:40:53 executing program 3: socket$inet(0x2, 0xb, 0x0) 09:40:53 executing program 1: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000100)={0x1ff, 0x1000, 0x7c2e0fe}) 09:40:53 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x84000, 0x0) 09:40:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r1 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r1, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:40:53 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = getpgrp(0x0) r2 = socket$unix(0x1, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f0000006980)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000006900)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [r2]}}, @cred={{0x1c}}], 0x58}}], 0x1, 0x0) 09:40:53 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLIST(r0, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x44, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @ipv4={'\x00', '\xff\xff', @broadcast}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}]}, 0xffffffffffffffa2}}, 0x0) 09:40:53 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0xba102, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 09:40:53 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000040)=@abs={0x1}, 0x6e) 09:40:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="8d"], 0x24}}, 0x0) [ 1072.876430][ T1202] ieee802154 phy0 wpan0: encryption failed: -22 [ 1072.883502][ T1202] ieee802154 phy1 wpan1: encryption failed: -22 09:40:54 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 09:40:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, 0x0, 0x0) 09:40:54 executing program 4: openat$drirender128(0xffffffffffffff9c, &(0x7f0000002480), 0x200, 0x0) 09:40:54 executing program 0: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 09:40:54 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f00000087c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 09:40:54 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) 09:40:55 executing program 3: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)) 09:40:55 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/ipc\x00') 09:40:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, 0x0, 0x0) 09:40:55 executing program 0: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 09:40:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x4121) 09:40:55 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000040)=@file={0x1, './file0/file0\x00'}, 0x6e) 09:40:55 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000000), 0x8) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) 09:40:55 executing program 4: socket$unix(0x1, 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) select(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0xffc}, 0x0) 09:40:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, 0x0, 0x0) 09:40:56 executing program 0: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 09:40:56 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) 09:40:56 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000015680), 0x40, 0x0) 09:40:56 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000000), 0xfffffd20) 09:40:56 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f00000002c0)={'ip6_vti0\x00', 0x0}) 09:40:56 executing program 1: r0 = socket$inet(0x2, 0x3, 0x8) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000040)) 09:40:56 executing program 0: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 09:40:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}], 0x3) 09:40:57 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f000000ef40)='./cgroup.net/syz0\x00', 0x200002, 0x0) 09:40:57 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 09:40:57 executing program 4: socketpair(0xa, 0x3, 0x0, 0x0) 09:40:57 executing program 0: syz_usb_connect(0x0, 0x3d, &(0x7f00000006c0)={{0x12, 0x1, 0x0, 0x74, 0x49, 0x9d, 0x20, 0x13d8, 0x11, 0x484, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0xe4, 0x38, 0xc, 0x0, [], [{{0x9, 0x5, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, [@uac_iso={0x7}]}}, {}]}}]}}]}}, 0x0) 09:40:57 executing program 1: symlinkat(0x0, 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') 09:40:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000140), 0x0, 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000200)='!', 0x1}], 0x0, &(0x7f00000003c0)={[], [{@smackfsdef={'smackfsdef', 0x3d, '/\\!'}}]}) 09:40:57 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x802, 0x88) socket$kcm(0x10, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000007780)={&(0x7f0000000000)=@caif, 0x80, 0x0}, 0x0) 09:40:57 executing program 4: syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000000340)=[{0x0}, {0x0}], 0x0, 0x0) 09:40:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000000500)={0x3c, r1, 0x1, 0x0, 0x0, {0x9}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 09:40:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}], 0x3) 09:40:58 executing program 3: syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000340), 0x0, 0x0) [ 1077.058989][T12725] usb 1-1: new high-speed USB device number 10 using dummy_hcd 09:40:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = openat$procfs(0xffffff9c, &(0x7f00000000c0)='/proc/asound/seq/clients\x00', 0x0, 0x0) read(r1, &(0x7f00000013c0)=""/82, 0x52) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000940)) clone3(0x0, 0x0) [ 1077.301620][T12725] usb 1-1: Using ep0 maxpacket: 32 [ 1077.420376][T12725] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 1077.430512][T12725] usb 1-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping 09:40:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000000500)={0x3c, r1, 0x1, 0x0, 0x0, {0x1b}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 09:40:58 executing program 4: syz_genetlink_get_family_id$ieee802154(&(0x7f0000002080), 0xffffffffffffffff) 09:40:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}], 0x3) [ 1077.710458][T12725] usb 1-1: New USB device found, idVendor=13d8, idProduct=0011, bcdDevice= 4.84 [ 1077.720091][T12725] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1077.728528][T12725] usb 1-1: Product: syz [ 1077.732824][T12725] usb 1-1: Manufacturer: syz [ 1077.737691][T12725] usb 1-1: SerialNumber: syz [ 1077.932626][T12725] usb 1-1: config 0 descriptor?? [ 1078.023274][T12725] usb 1-1: selecting invalid altsetting 1 [ 1078.029636][T12725] comedi comedi0: could not switch to alternate setting 1 [ 1078.036893][T12725] usbduxfast 1-1:0.0: driver 'usbduxfast' failed to auto-configure device. [ 1078.241607][ T8301] usb 1-1: USB disconnect, device number 10 [ 1078.998789][ T8301] usb 1-1: new high-speed USB device number 11 using dummy_hcd [ 1079.238996][ T8301] usb 1-1: Using ep0 maxpacket: 32 [ 1079.360776][ T8301] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 1079.370811][ T8301] usb 1-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 1079.540169][ T8301] usb 1-1: New USB device found, idVendor=13d8, idProduct=0011, bcdDevice= 4.84 [ 1079.549729][ T8301] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1079.557884][ T8301] usb 1-1: Product: syz [ 1079.562791][ T8301] usb 1-1: Manufacturer: syz [ 1079.567521][ T8301] usb 1-1: SerialNumber: syz 09:41:00 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000800), r0) 09:41:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000000500)={0x3c, r1, 0x1, 0x0, 0x0, {0xb}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 09:41:00 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) 09:41:00 executing program 4: syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) 09:41:00 executing program 1: getgid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) syz_mount_image$btrfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000340)=[{&(0x7f00000001c0)='u', 0x1, 0x2}, {&(0x7f0000000200)="21ecfdf0132cdddeac73d2b9622585", 0xf}, {0x0, 0x0, 0x306}], 0x1000000, &(0x7f00000003c0)={[{@inode_cache}, {@noflushoncommit}], [{@permit_directio}]}) 09:41:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {0x0}], 0x4) [ 1079.756216][ T8301] usb 1-1: config 0 descriptor?? [ 1079.792776][ T8301] usb 1-1: can't set config #0, error -71 [ 1079.869382][ T8301] usb 1-1: USB disconnect, device number 11 [ 1080.104535][T15522] loop1: detected capacity change from 0 to 3 09:41:01 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, 0x0, &(0x7f0000002300)) 09:41:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000140), 0x0, 0x0, 0x3, &(0x7f0000000340)=[{&(0x7f00000001c0)}, {0x0}, {0x0, 0x0, 0x306}], 0x0, 0x0) 09:41:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {0x0}], 0x4) [ 1080.354139][T15533] loop1: detected capacity change from 0 to 3 09:41:01 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000000500)={0x3c, r1, 0x1, 0x0, 0x0, {0xb}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 09:41:01 executing program 1: getgid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) syz_mount_image$btrfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000340)=[{&(0x7f00000001c0)='u', 0x1, 0x2}, {&(0x7f0000000200)="21ecfdf0132cdddeac73d2b9622585", 0xf}, {0x0, 0x0, 0x306}], 0x1000000, &(0x7f00000003c0)={[{@inode_cache}, {@noflushoncommit}], [{@permit_directio}]}) 09:41:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)) [ 1080.902900][T15542] loop2: detected capacity change from 0 to 3 [ 1081.038030][T15542] loop2: detected capacity change from 0 to 3 09:41:02 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480), 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x3, &(0x7f0000000680)=@framed, &(0x7f00000006c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000800), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:41:02 executing program 2: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:41:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000000500)={0x3c, r1, 0x1, 0x0, 0x0, {0xb}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 09:41:02 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {0x0}], 0x4) [ 1081.440296][T15561] loop1: detected capacity change from 0 to 3 09:41:02 executing program 0: syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) mknodat(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x0, 0x0) 09:41:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff000d000000020000000b000000ec0079c9130001", 0xfed3}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x200003f8, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) 09:41:03 executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000880)='/sys/module/stk1160', 0x0, 0x0) 09:41:03 executing program 2: syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$IEEE802154_ASSOCIATE_REQ(0xffffffffffffffff, 0x0, 0x0) 09:41:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000000500)={0x3c, r1, 0x1, 0x0, 0x0, {0xb}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 09:41:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000200)}], 0x3) 09:41:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={0x0}}, 0x0) 09:41:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000000500)={0x3c, 0x0, 0x1, 0x0, 0x0, {0xb}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 09:41:04 executing program 4: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) syz_mount_image$btrfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000340)=[{&(0x7f00000001c0)='u', 0x1, 0x2}, {&(0x7f0000000200)='!', 0x1}, {0x0, 0x0, 0x306}], 0x0, 0x0) 09:41:04 executing program 2: statx(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0, 0x0) 09:41:04 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f0000000980)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) 09:41:05 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000200)}], 0x3) [ 1083.977579][T15605] loop4: detected capacity change from 0 to 3 09:41:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000000500)={0x3c, 0x0, 0x1, 0x0, 0x0, {0xb}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 09:41:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff000d000000020000000b000000ec0079c9130001", 0xfed3}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x200003f8, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) 09:41:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x40, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r1, &(0x7f0000006380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000040)={0x50, 0x0, r2, {0x7, 0x1f}}, 0x50) syz_fuse_handle_req(r1, &(0x7f00000021c0)="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", 0x2000, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40101, 0x0) dup3(r0, r1, 0x0) io_setup(0x202, &(0x7f0000000200)=0x0) io_submit(r4, 0x4, &(0x7f0000000780)=[&(0x7f0000000440)={0x0, 0xf0ff1f, 0x4, 0x1, 0x0, r3, &(0x7f0000000380)='\b', 0x20000381}]) 09:41:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000000500)={0x3c, r1, 0x1, 0x0, 0x0, {0x2c}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 09:41:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000200)={0x0, 0xa, &(0x7f00000001c0)=[{&(0x7f0000000180)="407bdf4ef1fc39234b4129174b77733713136f14", 0x14}], 0x1}, 0x0) 09:41:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000000500)={0x3c, 0x0, 0x1, 0x0, 0x0, {0xb}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 09:41:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000200)}], 0x3) 09:41:07 executing program 0: r0 = socket(0x18, 0x3, 0x0) getpeername(r0, 0x0, 0x0) 09:41:08 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0xffffffffffffffff}, 0xc) 09:41:08 executing program 3: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000000500)={0x3c, r0, 0x1, 0x0, 0x0, {0xb}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 09:41:08 executing program 2: r0 = socket(0x18, 0x1, 0x0) sendmsg$unix(0xffffffffffffff9c, &(0x7f0000001700)={&(0x7f0000000040)=ANY=[@ANYBLOB="fb18c3030018feffff02", @ANYRES32, @ANYRES16, @ANYRES64, @ANYRES64=r0], 0x1c, 0x0}, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r1 = socket(0x18, 0x2, 0x0) r2 = socket(0x18, 0x3, 0x0) r3 = socket(0x18, 0x8002, 0x0) dup2(r3, r2) r4 = dup2(r2, r1) sendmsg$unix(r4, &(0x7f0000001700)={0x0, 0x0, 0x0}, 0x0) 09:41:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {0x0}, {&(0x7f0000000200)}], 0x4) 09:41:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000200)="c75d4eed717ca9847a2c9ec02f13efc4a49b0a1fb5ce6072679ed9f7f62465fb4636c2fe95ecd6731be40a7b1c30af9046e43b274fd46c6fc0ffc58c9d60547be6f2e32eb1aa42ed95584ba6e792f18782bdc212d2a78b741341fb913148c3455bf9ef61fad9", 0x66}, {&(0x7f0000000280)="9e1797b0c8714d4eec56475c317fab72da1f500a10aeee042773fe9fc59c309dded7433da7ae1d2ddebb21d4a66d151d41ff3663391ade1e402f66835492d092e086d583c5ba6a6e0d28459397ac3a0c0e8434a73b1eefd50abd2b305f23", 0x5e}, {&(0x7f0000000980)="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", 0x73d}], 0x3}, 0x0) 09:41:11 executing program 1: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) sync() shmget(0x3, 0x4000, 0xa0, &(0x7f0000ffc000/0x4000)=nil) 09:41:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000840)={&(0x7f00000001c0)=@abs, 0x8, &(0x7f0000000600)=[{&(0x7f0000000200)="c75d4eed717ca9847a2c9ec02f13efc4a49b0a1fb5ce6072679ed9f7f62465fb4636c2fe95ecd6731be40a7b1c30af9046e43b274fd46c6fc0ffc58c9d60547be6f2e32eb1aa42ed95584ba6e792f18782bdc212d2a78b741341fb913148c3455bf9ef61fad9", 0x66}, {&(0x7f0000000280)="9e1797b0c8714d4eec56475c317fab72da1f500a10aeee042773fe9fc59c309dded7433da7ae1d2ddebb21d4a66d151d41ff3663391ade1e402f66835492d092e086d583c5ba6a6e0d28459397ac3a0c0e8434a73b1eefd50abd2b305f23", 0x5e}, {0x0}, {&(0x7f0000000980)="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", 0xf3d}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000001980)=[@rights, @cred, @rights, @cred, @rights, @cred, @cred, @cred], 0xe8}, 0x0) 09:41:11 executing program 2: mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x4812, 0xffffffffffffffff, 0x0) 09:41:11 executing program 3: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000000500)={0x3c, r0, 0x1, 0x0, 0x0, {0xb}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 09:41:11 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {0x0}, {&(0x7f0000000200)}], 0x4) 09:41:11 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg(r0, &(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c80)=[{0x60, 0x0, 0x0, "dde4269904f08c492329da4f5d94e3c7c82812e3434f2a1fd25abe82770be79fae7dcd3ec40ae2306bbe7925678f961714df1b4061aa1cd7ae411cc9b066faebe1e0616f959caa8166"}, {0x88, 0x0, 0x0, "c695cbaebc57347c28254d9ab247b5d99d606d2c2618bf8bef0cd3a18dfbf3bb1b1c236e74c8fe1f88d13887fbf68f8414f40f5a596cf1e181d056c92a40b9d22061b709451fc0d70e18c4f1e54195a650b616e2fd52ee84699fd2df60035edbc33e10af633febd0ae65fdc1765ae49c83"}], 0xe8}, 0x0) 09:41:11 executing program 2: shmctl$SHM_UNLOCK(0xffffffffffffffff, 0x4) 09:41:11 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000115, 0x0, 0x0) 09:41:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001980)=[@rights], 0x10}, 0x0) 09:41:11 executing program 3: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000000500)={0x3c, r0, 0x1, 0x0, 0x0, {0xb}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 09:41:11 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f00000000c0)=""/116, 0x74}, {0x0}, {&(0x7f0000000200)}], 0x4) 09:41:12 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f0000000000)=0x4) 09:41:12 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x1011, r0, 0x0) 09:41:12 executing program 0: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 09:41:12 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, 0x0, &(0x7f0000000040)) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 09:41:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000000500)={0x3c, r1, 0x1, 0x0, 0x0, {0xb}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 09:41:12 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x3) 09:41:12 executing program 1: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000000)) 09:41:12 executing program 2: mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) munlock(&(0x7f0000ffb000/0x1000)=nil, 0x1000) 09:41:12 executing program 0: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = getpid() fcntl$setown(r0, 0x6, r1) 09:41:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000600)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000980)="f7", 0x1}], 0x4}, 0x0) 09:41:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000000500)={0x3c, r1, 0x1, 0x0, 0x0, {0xb}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 09:41:13 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x3) 09:41:13 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$dupfd(r0, 0xa, r0) 09:41:13 executing program 1: clock_getres(0x0, &(0x7f0000001540)) 09:41:13 executing program 0: mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x4812, 0xffffffffffffff9c, 0x0) 09:41:13 executing program 4: socket(0x18, 0x3, 0x1) 09:41:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000000500)={0x3c, r1, 0x1, 0x0, 0x0, {0xb}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 09:41:13 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) socket$kcm(0x29, 0x5, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305839, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a10, 0x1700) 09:41:14 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff14, 0x10, 0x0}, 0x78) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000080)) 09:41:14 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x3) 09:41:14 executing program 4: socket$kcm(0x10, 0x2, 0x10) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x6, 0xfe, 0x0, 0x8, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_config_ext={0x0, 0xc66}, 0x200, 0x0, 0x1ff, 0x0, 0x0, 0x8, 0x5, 0x0, 0x8, 0x0, 0x9}, 0x0, 0xb, r2, 0x1) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x59, 0x0, 0x8, 0x4, 0x0, 0x0, 0x2000, 0x10, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x7, 0x0, 0x5e31106e947d73fd, 0x0, 0x9, 0x2, 0x101, 0x3, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x80, 0x6, 0x82, 0x9, 0xaa, 0x0, 0x4, 0x4021, 0xb, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x4f8}, 0x2040, 0x7ff, 0x4, 0x5, 0xf64f, 0x2, 0x7, 0x0, 0x4, 0x0, 0x3}, 0xffffffffffffffff, 0x5, r0, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_type(r0, &(0x7f0000000180), 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) r3 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/net\x00') bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={r3, 0x11, 0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 09:41:14 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="faff7075a3c33fbea8202b6dffbb656d6f72a1fc"], 0x12) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x1f}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e80)={&(0x7f00000008c0)='xen_mc_flush\x00'}, 0x10) perf_event_open(&(0x7f0000000dc0)={0x2, 0x80, 0x5d, 0xdb, 0x0, 0x6, 0x0, 0x2051, 0x31002, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x28e, 0x0, @perf_bp={&(0x7f0000000d80)}, 0x4818, 0x7, 0x6, 0x0, 0x5, 0x17f, 0xfffc, 0x0, 0x2}, 0x0, 0x100000004, r1, 0xb) r3 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r3, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f00000018c0)=""/4101, 0x1005}, {&(0x7f0000000380)=""/138, 0x8a}, {&(0x7f0000000440)=""/90, 0x5a}, {&(0x7f0000000140)=""/40, 0x28}, {&(0x7f0000000500)=""/99, 0x63}, {&(0x7f0000000b00)=""/179, 0xb3}, {&(0x7f0000006e40)=""/4099, 0x1003}, {&(0x7f00000009c0)=""/165, 0xa5}], 0x8, &(0x7f0000000900)=""/151, 0x97}, 0x10003) socket$kcm(0x10, 0x2, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x8, r2, 0xa) 09:41:14 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000000500)={0x3c, r0, 0x1, 0x0, 0x0, {0xb}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 09:41:14 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, 0x0, 0x0) 09:41:14 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {0x0}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:41:15 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'hsr0\x00', @remote}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x11, 0x0, &(0x7f0000000040)="b90103600000f000009e0ff043051fffff", 0x0, 0x0, 0xa000000, 0x0, 0x0, 0x0, 0x0}, 0x48) close(r0) r3 = socket$kcm(0x2, 0x3, 0x2) r4 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xd, 0x7f, 0x0, 0x7, 0x0, 0xfffffffffffffff6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20001, 0x6, 0x1, 0x1}, 0x0, 0x0, r4, 0x9) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x80, 0x4, 0x5, 0x0, 0x3, 0x0, 0x0, 0xf80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x91, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, r1, 0x8) socket$kcm(0x29, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'hsr0\x00', @link_local}) 09:41:15 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000000500)={0x3c, r0, 0x1, 0x0, 0x0, {0xb}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 09:41:15 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) fchownat(r0, &(0x7f00000002c0)='\x00', 0x0, 0x0, 0x1000) 09:41:15 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="faff7075a3c33fbea8202b6dffbb656d6f72a1fc"], 0x12) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x1f}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e80)={&(0x7f00000008c0)='xen_mc_flush\x00'}, 0x10) perf_event_open(&(0x7f0000000dc0)={0x2, 0x80, 0x5d, 0xdb, 0x0, 0x6, 0x0, 0x2051, 0x31002, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x28e, 0x0, @perf_bp={&(0x7f0000000d80)}, 0x4818, 0x7, 0x6, 0x0, 0x5, 0x17f, 0xfffc, 0x0, 0x2}, 0x0, 0x100000004, r1, 0xb) r3 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r3, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f00000018c0)=""/4101, 0x1005}, {&(0x7f0000000380)=""/138, 0x8a}, {&(0x7f0000000440)=""/90, 0x5a}, {&(0x7f0000000140)=""/40, 0x28}, {&(0x7f0000000500)=""/99, 0x63}, {&(0x7f0000000b00)=""/179, 0xb3}, {&(0x7f0000006e40)=""/4099, 0x1003}, {&(0x7f00000009c0)=""/165, 0xa5}], 0x8, &(0x7f0000000900)=""/151, 0x97}, 0x10003) socket$kcm(0x10, 0x2, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x8, r2, 0xa) [ 1094.433445][T15774] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1094.617533][T15777] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1094.935284][ T24] audit: type=1804 audit(1639129276.130:56): pid=15743 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703116945/syzkaller.DjOKDi/350/memory.events" dev="sda1" ino=14025 res=1 errno=0 [ 1094.963725][ T24] audit: type=1800 audit(1639129276.130:57): pid=15743 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=14025 res=0 errno=0 09:41:16 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) sendmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000180)="8e", 0x1}], 0x1}}], 0x2, 0x0) 09:41:16 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000000500)={0x3c, r0, 0x1, 0x0, 0x0, {0xb}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 09:41:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {0x0}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:41:16 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000002c0), 0x0, 0x0, 0xfffffed0}}], 0x2, 0x0) 09:41:16 executing program 4: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x3, &(0x7f0000001600)=[{&(0x7f0000000180)="bf", 0x1, 0x2474}, {&(0x7f0000000240)="eb", 0x1}, {&(0x7f0000000080)="8b", 0x1, 0xfffffffffffffffd}], 0x0, 0x0) [ 1095.053516][ T24] audit: type=1800 audit(1639129276.240:58): pid=15763 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=14025 res=0 errno=0 09:41:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, 0x0, 0x0) 09:41:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001400)=""/4110, 0x100e}, {0x0}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:41:16 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000002c0)}}, {{&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000140)=[{0xffffffffffffffa7, 0x0, 0x0, "0bd35e"}, {0xd0, 0x0, 0x0, "e7a15afa6b68763275b2f941d1d4111d40fd85bd4c946719d980e208184e1dfff9b968ec8b7dbb08fbc6d77eba15dfc639a009b7342386ee9d785684426d0647d5a66ab12b5b5c8f15734af5e7b4b6f88cc8e7a06999cf265a12bd43ad8da40e632f2698c6238efbd717a0e044af1e3151d6c43af003dc99a2258ab502af6de29b0b970be7acbe06a30a9d6c0303384ec8b974a191bea509b5fe3ac5ba52f69c3745bddc322c60919e7f753ae03f025cfebb659f5a617e28ec5492bb8c"}], 0xe8}}], 0x3, 0x0) [ 1095.622642][T15795] loop4: detected capacity change from 0 to 264192 09:41:16 executing program 2: setreuid(0xee01, 0xee00) setuid(0xee01) 09:41:17 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="faff7075a3c33fbea8202b6dffbb656d6f72a1fc"], 0x12) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x1f}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e80)={&(0x7f00000008c0)='xen_mc_flush\x00'}, 0x10) perf_event_open(&(0x7f0000000dc0)={0x2, 0x80, 0x5d, 0xdb, 0x0, 0x6, 0x0, 0x2051, 0x31002, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x28e, 0x0, @perf_bp={&(0x7f0000000d80)}, 0x4818, 0x7, 0x6, 0x0, 0x5, 0x17f, 0xfffc, 0x0, 0x2}, 0x0, 0x100000004, r1, 0xb) r3 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r3, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f00000018c0)=""/4101, 0x1005}, {&(0x7f0000000380)=""/138, 0x8a}, {&(0x7f0000000440)=""/90, 0x5a}, {&(0x7f0000000140)=""/40, 0x28}, {&(0x7f0000000500)=""/99, 0x63}, {&(0x7f0000000b00)=""/179, 0xb3}, {&(0x7f0000006e40)=""/4099, 0x1003}, {&(0x7f00000009c0)=""/165, 0xa5}], 0x8, &(0x7f0000000900)=""/151, 0x97}, 0x10003) socket$kcm(0x10, 0x2, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x8, r2, 0xa) [ 1095.789999][T15795] loop4: detected capacity change from 0 to 264192 09:41:17 executing program 4: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000980), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:41:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, 0x0, 0x0) 09:41:17 executing program 1: clock_gettime(0x0, &(0x7f00000000c0)) select(0x40, &(0x7f0000000000)={0x4}, &(0x7f0000000040)={0x7}, 0x0, 0x0) 09:41:17 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg(r0, &(0x7f0000001000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002140)=[{0x10, 0x113}], 0x10}}], 0x2, 0x0) 09:41:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x3) 09:41:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, 0x0, 0x0) 09:41:18 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg(r0, &(0x7f0000006140)=[{{0x0, 0x0, 0x0}}, {{0x0, 0xfffffffffffffddd, &(0x7f00000002c0)}}], 0x2, 0x0) 09:41:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @local}, 0x80) 09:41:18 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg(r0, &(0x7f0000001000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002140)=[{0x10}], 0x10}}], 0x2, 0x0) 09:41:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x3) 09:41:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000001980)={0x0, 0x0, 0x0}, 0x0) 09:41:19 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="faff7075a3c33fbea8202b6dffbb656d6f72a1fc"], 0x12) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x1f}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e80)={&(0x7f00000008c0)='xen_mc_flush\x00'}, 0x10) perf_event_open(&(0x7f0000000dc0)={0x2, 0x80, 0x5d, 0xdb, 0x0, 0x6, 0x0, 0x2051, 0x31002, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x28e, 0x0, @perf_bp={&(0x7f0000000d80)}, 0x4818, 0x7, 0x6, 0x0, 0x5, 0x17f, 0xfffc, 0x0, 0x2}, 0x0, 0x100000004, r1, 0xb) r3 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r3, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f00000018c0)=""/4101, 0x1005}, {&(0x7f0000000380)=""/138, 0x8a}, {&(0x7f0000000440)=""/90, 0x5a}, {&(0x7f0000000140)=""/40, 0x28}, {&(0x7f0000000500)=""/99, 0x63}, {&(0x7f0000000b00)=""/179, 0xb3}, {&(0x7f0000006e40)=""/4099, 0x1003}, {&(0x7f00000009c0)=""/165, 0xa5}], 0x8, &(0x7f0000000900)=""/151, 0x97}, 0x10003) socket$kcm(0x10, 0x2, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x8, r2, 0xa) 09:41:19 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000080), 0x0, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000fc0)) 09:41:19 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x4100, 0x0) 09:41:19 executing program 2: syz_open_dev$dri(&(0x7f0000000000), 0x7, 0x200) 09:41:19 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x3) 09:41:19 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, 0x0) 09:41:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000001980)={0x0, 0x0, 0x0}, 0x0) 09:41:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000005b00), 0x4000000000000d1, 0x0) recvmmsg(r0, &(0x7f0000003fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x40000}}], 0x2, 0x0, 0x0) 09:41:19 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @fixed}, 0xe) 09:41:20 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000600)={0x14, 0x0, 0xb34477ca07f4f837}, 0x14}}, 0x0) 09:41:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{0x0}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:41:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000001980)={0x0, 0x0, 0x0}, 0x0) 09:41:20 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="faff7075a3c33fbea8202b6dffbb656d6f72a1fc"], 0x12) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x1f}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e80)={&(0x7f00000008c0)='xen_mc_flush\x00'}, 0x10) perf_event_open(&(0x7f0000000dc0)={0x2, 0x80, 0x5d, 0xdb, 0x0, 0x6, 0x0, 0x2051, 0x31002, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x28e, 0x0, @perf_bp={&(0x7f0000000d80)}, 0x4818, 0x7, 0x6, 0x0, 0x5, 0x17f, 0xfffc, 0x0, 0x2}, 0x0, 0x100000004, r1, 0xb) r2 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890b, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f00000018c0)=""/4101, 0x1005}, {&(0x7f0000000380)=""/138, 0x8a}, {&(0x7f0000000440)=""/90, 0x5a}, {&(0x7f0000000140)=""/40, 0x28}, {&(0x7f0000000500)=""/99, 0x63}, {&(0x7f0000000b00)=""/179, 0xb3}, {&(0x7f0000006e40)=""/4099, 0x1003}, {&(0x7f00000009c0)=""/165, 0xa5}], 0x8, &(0x7f0000000900)=""/151, 0x97}, 0x10003) socket$kcm(0x10, 0x2, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:41:20 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000001980), 0x42000, 0x0) 09:41:20 executing program 4: io_setup(0x5, &(0x7f00000007c0)=0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) io_getevents(r0, 0x3, 0x3, &(0x7f00000000c0)=[{}, {}, {}], &(0x7f0000000240)={0x0, r1+60000000}) 09:41:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={0x0}}, 0x0) 09:41:21 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{0x0}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:41:21 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) accept4$bt_l2cap(r0, 0x0, 0x0, 0x80000) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 09:41:21 executing program 1: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x204040, 0x0) 09:41:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={0x0}}, 0x0) 09:41:22 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) poll(&(0x7f00000006c0)=[{r0, 0x4}], 0x1, 0x0) 09:41:22 executing program 2: socket(0x28, 0x0, 0xfffffffd) 09:41:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x841c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa22e, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10613908}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x4001, &(0x7f0000000200)=0x100000000000001, 0x81) set_mempolicy(0x3, &(0x7f0000000480)=0x7, 0xfffffffffffffff9) shmat(0xffffffffffffffff, &(0x7f000055a000/0x2000)=nil, 0x3000) mprotect(&(0x7f00004d7000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmat(0x0, &(0x7f0000420000/0x1000)=nil, 0x2000) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f00002c1000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x6000) clone(0xa0000000, &(0x7f0000000280)="1395d8f2d867306aa749df33616820303fbdd05a1d3e51253e663dc0ce316f9d95029f33c3edbd8f8eb58116d6e604a91cd60ee6df8a58be782f66cc4418d17eb360fbd9b9e20deb", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="bc29da696093be536db9dea50a948c5f7bb8fcee98a131cbe1e0cebe6f24ee64b43f16f9ebf5317a24b4f4079da3f36cd0b363ec0e8e7497f9ae94b27106daea59cce345819e7c8e945a72771fff918ce367e282fdcf56e705008b3a4c1b60a9071456c2100d3067999bdf3abd7e5492358d4100852eed2651a49ccbc5b227e945dc03a45e02e5c30c44d45825e1f1f098c5f2473659b74680f4808c51b2bc52b2a08b207463dfd424f8333295e4c6872ab79274948f69d44da4d88a31c885a3007e07e9716b46a2b28366e628f15c80a2d40d5908fdfe728e5724642a169aeefb58f6e2d72e95f900ce0cf0886bb47e0c1e45") shmctl$SHM_UNLOCK(0x0, 0xc) shmat(r0, &(0x7f00009f1000/0x1000)=nil, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000b49000/0x2000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) readv(r1, &(0x7f0000000240)=[{0x0}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000180)=""/89, 0x59}, {&(0x7f0000000200)}], 0x4) 09:41:22 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000000c0)=0x8000) 09:41:22 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="faff7075a3c33fbea8202b6dffbb656d6f72a1fc"], 0x12) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x1f}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e80)={&(0x7f00000008c0)='xen_mc_flush\x00'}, 0x10) perf_event_open(&(0x7f0000000dc0)={0x2, 0x80, 0x5d, 0xdb, 0x0, 0x6, 0x0, 0x2051, 0x31002, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x28e, 0x0, @perf_bp={&(0x7f0000000d80)}, 0x4818, 0x7, 0x6, 0x0, 0x5, 0x17f, 0xfffc, 0x0, 0x2}, 0x0, 0x100000004, r1, 0xb) r2 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890b, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f00000018c0)=""/4101, 0x1005}, {&(0x7f0000000380)=""/138, 0x8a}, {&(0x7f0000000440)=""/90, 0x5a}, {&(0x7f0000000140)=""/40, 0x28}, {&(0x7f0000000500)=""/99, 0x63}, {&(0x7f0000000b00)=""/179, 0xb3}, {&(0x7f0000006e40)=""/4099, 0x1003}, {&(0x7f00000009c0)=""/165, 0xa5}], 0x8, &(0x7f0000000900)=""/151, 0x97}, 0x10003) socket$kcm(0x10, 0x2, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) [ 1100.954501][T12725] Bluetooth: hci5: command 0x0405 tx timeout 09:41:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={0x0}}, 0x0) 09:41:22 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) 09:41:22 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x9, @none, 0x0, 0x1}, 0xe) 09:41:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', 0x0, 0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000000c0)="a4", 0x1}], 0x0, &(0x7f0000001540)) 09:41:23 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001980), 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f00000000c0), 0x2, 0x0) 09:41:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000000500)={0x3c, 0x0, 0x1, 0x0, 0x0, {0xb}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 09:41:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x14}, 0x14}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000013c0), r1) 09:41:23 executing program 2: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$get_persistent(0x16, 0xffffffffffffffff, r1) 09:41:23 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x3) 09:41:23 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="faff7075a3c33fbea8202b6dffbb656d6f72a1fc"], 0x12) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x1f}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e80)={&(0x7f00000008c0)='xen_mc_flush\x00'}, 0x10) perf_event_open(&(0x7f0000000dc0)={0x2, 0x80, 0x5d, 0xdb, 0x0, 0x6, 0x0, 0x2051, 0x31002, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x28e, 0x0, @perf_bp={&(0x7f0000000d80)}, 0x4818, 0x7, 0x6, 0x0, 0x5, 0x17f, 0xfffc, 0x0, 0x2}, 0x0, 0x100000004, r1, 0xb) r2 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890b, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f00000018c0)=""/4101, 0x1005}, {&(0x7f0000000380)=""/138, 0x8a}, {&(0x7f0000000440)=""/90, 0x5a}, {&(0x7f0000000140)=""/40, 0x28}, {&(0x7f0000000500)=""/99, 0x63}, {&(0x7f0000000b00)=""/179, 0xb3}, {&(0x7f0000006e40)=""/4099, 0x1003}, {&(0x7f00000009c0)=""/165, 0xa5}], 0x8, &(0x7f0000000900)=""/151, 0x97}, 0x10003) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:41:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000013c0), 0xffffffffffffffff) 09:41:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000000500)={0x3c, 0x0, 0x1, 0x0, 0x0, {0xb}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 09:41:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x14}, 0x14}}, 0x0) 09:41:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) 09:41:24 executing program 1: openat$random(0xffffffffffffff9c, 0x0, 0x503100, 0x0) 09:41:24 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002500), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 09:41:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000000500)={0x3c, 0x0, 0x1, 0x0, 0x0, {0xb}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 09:41:24 executing program 4: r0 = socket(0x10, 0x80803, 0x0) write(r0, &(0x7f0000000000)="120000001a003517fc85bc00fef6000d0a0d", 0x12) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:41:24 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000001040), 0x0, 0x0) 09:41:25 executing program 1: clock_nanosleep(0x8, 0x0, &(0x7f0000000040)={0x77359400}, 0x0) 09:41:25 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="faff7075a3c33fbea8202b6dffbb656d6f72a1fc"], 0x12) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x1f}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e80)={&(0x7f00000008c0)='xen_mc_flush\x00'}, 0x10) perf_event_open(&(0x7f0000000dc0)={0x2, 0x80, 0x5d, 0xdb, 0x0, 0x6, 0x0, 0x2051, 0x31002, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x28e, 0x0, @perf_bp={&(0x7f0000000d80)}, 0x4818, 0x7, 0x6, 0x0, 0x5, 0x17f, 0xfffc, 0x0, 0x2}, 0x0, 0x100000004, r1, 0xb) r2 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890b, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f00000018c0)=""/4101, 0x1005}, {&(0x7f0000000380)=""/138, 0x8a}, {&(0x7f0000000440)=""/90, 0x5a}, {&(0x7f0000000140)=""/40, 0x28}, {&(0x7f0000000500)=""/99, 0x63}, {&(0x7f0000000b00)=""/179, 0xb3}, {&(0x7f0000006e40)=""/4099, 0x1003}, {&(0x7f00000009c0)=""/165, 0xa5}], 0x8, &(0x7f0000000900)=""/151, 0x97}, 0x10003) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:41:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000000500)={0x3c, r1, 0x0, 0x0, 0x0, {0xb}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 09:41:25 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000040)) 09:41:25 executing program 5: bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) 09:41:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x90, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x0, &(0x7f00000000c0)={0xc, 0x9}) 09:41:25 executing program 4: accept4$bt_l2cap(0xffffffffffffffff, 0x0, 0x0, 0x180000) 09:41:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000000500)={0x3c, r1, 0x0, 0x0, 0x0, {0xb}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 09:41:26 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 09:41:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000001380)={&(0x7f00000012c0), 0xc, &(0x7f0000001340)={0x0}}, 0x0) 09:41:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300)=ANY=[], 0x14}}, 0x0) 09:41:26 executing program 1: syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x0) sendmsg$NL802154_CMD_SET_CHANNEL(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000980), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:41:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000000500)={0x3c, r1, 0x0, 0x0, 0x0, {0xb}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 09:41:26 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="faff7075a3c33fbea8202b6dffbb656d6f72a1fc"], 0x12) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x1f}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e80)={&(0x7f00000008c0)='xen_mc_flush\x00'}, 0x10) perf_event_open(&(0x7f0000000dc0)={0x2, 0x80, 0x5d, 0xdb, 0x0, 0x6, 0x0, 0x2051, 0x31002, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x28e, 0x0, @perf_bp={&(0x7f0000000d80)}, 0x4818, 0x7, 0x6, 0x0, 0x5, 0x17f, 0xfffc, 0x0, 0x2}, 0x0, 0x100000004, r1, 0xb) r2 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890b, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f00000018c0)=""/4101, 0x1005}, {&(0x7f0000000380)=""/138, 0x8a}, {&(0x7f0000000440)=""/90, 0x5a}, {&(0x7f0000000140)=""/40, 0x28}, {&(0x7f0000000500)=""/99, 0x63}, {&(0x7f0000000b00)=""/179, 0xb3}, {&(0x7f0000006e40)=""/4099, 0x1003}, {&(0x7f00000009c0)=""/165, 0xa5}], 0x8, &(0x7f0000000900)=""/151, 0x97}, 0x10003) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:41:26 executing program 5: syz_open_dev$dri(&(0x7f0000000080), 0x0, 0x0) 09:41:26 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040)={0x1f, @none}, 0x8) 09:41:27 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x0, @none, 0x4, 0x1}, 0xe) 09:41:27 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x1fffff, 0x1, 0x11, r0, 0x0) 09:41:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000000500)={0x14, r1, 0x1, 0x0, 0x0, {0xb}}, 0x14}}, 0x0) 09:41:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x40801) 09:41:27 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, 0x0, 0xffffffffffffffb7) 09:41:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 09:41:27 executing program 1: semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f00000004c0)=""/91) 09:41:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000000500)={0x14, r1, 0x1, 0x0, 0x0, {0xb}}, 0x14}}, 0x0) 09:41:28 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="faff7075a3c33fbea8202b6dffbb656d6f72a1fc"], 0x12) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x1f}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e80)={&(0x7f00000008c0)='xen_mc_flush\x00'}, 0x10) perf_event_open(&(0x7f0000000dc0)={0x2, 0x80, 0x5d, 0xdb, 0x0, 0x6, 0x0, 0x2051, 0x31002, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x28e, 0x0, @perf_bp={&(0x7f0000000d80)}, 0x4818, 0x7, 0x6, 0x0, 0x5, 0x17f, 0xfffc, 0x0, 0x2}, 0x0, 0x100000004, r1, 0xb) r2 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890b, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:41:28 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000000c0)=0x2) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000080)=0x2) 09:41:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={0x0}}, 0x0) 09:41:28 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, &(0x7f0000000780)) 09:41:28 executing program 1: mknod(&(0x7f0000000000)='./file0\x00', 0x8000, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000000), 0x2cfea}], 0x1000000000000013) 09:41:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000000500)={0x14, r1, 0x1, 0x0, 0x0, {0xb}}, 0x14}}, 0x0) 09:41:29 executing program 5: syz_open_dev$dri(&(0x7f0000000580), 0x0, 0x4000) 09:41:29 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) 09:41:29 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r0, 0x0, 0x2a) [ 1108.316566][ T24] audit: type=1800 audit(1639129289.559:59): pid=16052 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file0" dev="sda1" ino=13992 res=0 errno=0 09:41:29 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x0) 09:41:29 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, 0x0, &(0x7f0000000180)) 09:41:30 executing program 5: connect$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) 09:41:30 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="faff7075a3c33fbea8202b6dffbb656d6f72a1fc"], 0x12) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x1f}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e80)={&(0x7f00000008c0)='xen_mc_flush\x00'}, 0x10) perf_event_open(&(0x7f0000000dc0)={0x2, 0x80, 0x5d, 0xdb, 0x0, 0x6, 0x0, 0x2051, 0x31002, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x28e, 0x0, @perf_bp={&(0x7f0000000d80)}, 0x4818, 0x7, 0x6, 0x0, 0x5, 0x17f, 0xfffc, 0x0, 0x2}, 0x0, 0x100000004, r1, 0xb) r2 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890b, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:41:30 executing program 4: openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000500)='./binderfs2/binder-control\x00', 0x0, 0x0) 09:41:30 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, 0x0, &(0x7f0000000180)) 09:41:30 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={0x0}}, 0x0) 09:41:30 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0xe00, 0x0) 09:41:30 executing program 4: openat$vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x106c1, 0x0) 09:41:30 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 09:41:31 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, 0x0, &(0x7f0000000180)) 09:41:31 executing program 2: openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000180), 0x1, 0x0) 09:41:31 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, 0x0) 09:41:31 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, 0x0) 09:41:31 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000640)={'batadv_slave_1\x00'}) 09:41:31 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="faff7075a3c33fbea8202b6dffbb656d6f72a1fc"], 0x12) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x1f}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e80)={&(0x7f00000008c0)='xen_mc_flush\x00'}, 0x10) perf_event_open(&(0x7f0000000dc0)={0x2, 0x80, 0x5d, 0xdb, 0x0, 0x6, 0x0, 0x2051, 0x31002, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x28e, 0x0, @perf_bp={&(0x7f0000000d80)}, 0x4818, 0x7, 0x6, 0x0, 0x5, 0x17f, 0xfffc, 0x0, 0x2}, 0x0, 0x100000004, r1, 0xb) r2 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890b, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:41:31 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, 0x0, &(0x7f0000000180)) 09:41:32 executing program 2: socket(0x18, 0x0, 0x8) 09:41:32 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, 0x0) 09:41:32 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, 0x0) 09:41:32 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @fixed, 0x4000, 0x2}, 0xe) 09:41:32 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000000)=0x10, 0x4) 09:41:32 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/partitions\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001600)=[{&(0x7f0000000240)=""/70, 0x46}], 0x1, 0x68, 0x0) 09:41:32 executing program 2: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 09:41:32 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, 0x0, 0xfffffffffffffcb7) 09:41:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYRES16=0x0, @ANYBLOB="02"], 0x1c}}, 0x0) 09:41:33 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="faff7075a3c33fbea8202b6dffbb656d6f72a1fc"], 0x12) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x1f}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e80)={&(0x7f00000008c0)='xen_mc_flush\x00'}, 0x10) perf_event_open(&(0x7f0000000dc0)={0x2, 0x80, 0x5d, 0xdb, 0x0, 0x6, 0x0, 0x2051, 0x31002, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x28e, 0x0, @perf_bp={&(0x7f0000000d80)}, 0x4818, 0x7, 0x6, 0x0, 0x5, 0x17f, 0xfffc, 0x0, 0x2}, 0x0, 0x100000004, r1, 0xb) r2 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:41:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240), 0xfffffffffffffeec, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0) 09:41:33 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x0, @none}, 0xe) 09:41:33 executing program 2: openat$vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x535801, 0x0) 09:41:33 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000000)=0x70, 0x4) 09:41:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1, 0x101, 0x0, 0x0, {0x67}}, 0x14}}, 0x0) 09:41:33 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001980), 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, 0x0) 09:41:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000005b00), 0x4000000000000d1, 0x0) recvmmsg(r0, &(0x7f0000003fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x4}}], 0x2, 0x0, 0x0) 09:41:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) 09:41:34 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000011c0)={0x0, 0x0}) 09:41:34 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @fixed, 0x4000}, 0xe) 09:41:34 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000580)='ns/uts\x00') 09:41:35 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="faff7075a3c33fbea8202b6dffbb656d6f72a1fc"], 0x12) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x1f}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e80)={&(0x7f00000008c0)='xen_mc_flush\x00'}, 0x10) perf_event_open(&(0x7f0000000dc0)={0x2, 0x80, 0x5d, 0xdb, 0x0, 0x6, 0x0, 0x2051, 0x31002, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x28e, 0x0, @perf_bp={&(0x7f0000000d80)}, 0x4818, 0x7, 0x6, 0x0, 0x5, 0x17f, 0xfffc, 0x0, 0x2}, 0x0, 0x100000004, r1, 0xb) r2 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:41:35 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0xfea7, @fixed, 0x4000}, 0xe) 09:41:35 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 09:41:35 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000bc0)={'syztnl0\x00', 0x0}) 09:41:35 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x9, @none, 0x4}, 0xe) 09:41:35 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={0x0, 0x14}}, 0x0) 09:41:35 executing program 2: syz_emit_ethernet(0x4e, &(0x7f0000000100)={@local, @empty, @val, {@ipv6}}, 0x0) 09:41:36 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x204040, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, 0x0) 09:41:36 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0xd59}) 09:41:36 executing program 1: setsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) 09:41:36 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001900), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, 0x0) 09:41:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000900)={0x2, 0x4e24, @broadcast}, 0x10, 0x0}, 0x0) 09:41:36 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="faff7075a3c33fbea8202b6dffbb656d6f72a1fc"], 0x12) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x1f}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e80)={&(0x7f00000008c0)='xen_mc_flush\x00'}, 0x10) perf_event_open(&(0x7f0000000dc0)={0x2, 0x80, 0x5d, 0xdb, 0x0, 0x6, 0x0, 0x2051, 0x31002, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x28e, 0x0, @perf_bp={&(0x7f0000000d80)}, 0x4818, 0x7, 0x6, 0x0, 0x5, 0x17f, 0xfffc, 0x0, 0x2}, 0x0, 0x100000004, r1, 0xb) socket$kcm(0x2, 0x8000000000002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:41:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000700), 0x4) 09:41:36 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080), 0x0, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, 0x0) 09:41:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, 0x0) 09:41:37 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000000)={0x0, 0xfff, 0x0, 0x1}, 0xc) 09:41:37 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f00000032c0), 0x400, 0x0) 09:41:37 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x9, @none}, 0xe) 09:41:37 executing program 5: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$unlink(0x9, r0, r0) 09:41:37 executing program 3: syz_open_dev$dri(&(0x7f0000000080), 0x1, 0x8040) 09:41:37 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080), 0x1, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, 0x0) 09:41:38 executing program 2: syz_open_dev$dri(&(0x7f0000000080), 0x0, 0x8040) 09:41:38 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000040), &(0x7f0000000700)=@ng, 0xfe9d, 0x0) 09:41:38 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="faff7075a3c33fbea8202b6dffbb656d6f72a1fc"], 0x12) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x1f}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e80)={&(0x7f00000008c0)='xen_mc_flush\x00'}, 0x10) perf_event_open(&(0x7f0000000dc0)={0x2, 0x80, 0x5d, 0xdb, 0x0, 0x6, 0x0, 0x2051, 0x31002, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x28e, 0x0, @perf_bp={&(0x7f0000000d80)}, 0x4818, 0x7, 0x6, 0x0, 0x5, 0x17f, 0xfffc, 0x0, 0x2}, 0x0, 0x100000004, r1, 0xb) socket$kcm(0x2, 0x8000000000002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:41:38 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000800)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000007c0)={&(0x7f0000000680)={0x4c}, 0x4c}}, 0x0) 09:41:38 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000e40), r0) 09:41:38 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0xfea7, @fixed}, 0xe) 09:41:38 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$alg(r0, 0x0, 0x0) 09:41:38 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000000c0)) 09:41:39 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100), 0x80002, 0x0) [ 1118.090016][ T24] audit: type=1800 audit(1639129299.339:60): pid=16210 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=set_data cause=unavailable-hash-algorithm comm="syz-executor.4" name="/net/tun" dev="devtmpfs" ino=686 res=0 errno=0 [ 1118.104387][ C1] vkms_vblank_simulate: vblank timer overrun 09:41:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, 0x0) 09:41:39 executing program 2: openat$binderfs_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) accept4$bt_l2cap(r0, 0x0, 0x0, 0x0) 09:41:39 executing program 5: ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000000)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f00000004c0)=""/91) 09:41:39 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000000c0)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000080)=0x2) 09:41:40 executing program 4: openat$ashmem(0xffffffffffffff9c, &(0x7f0000001040), 0x16080, 0x0) 09:41:40 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="faff7075a3c33fbea8202b6dffbb656d6f72a1fc"], 0x12) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x1f}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e80)={&(0x7f00000008c0)='xen_mc_flush\x00'}, 0x10) perf_event_open(&(0x7f0000000dc0)={0x2, 0x80, 0x5d, 0xdb, 0x0, 0x6, 0x0, 0x2051, 0x31002, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x28e, 0x0, @perf_bp={&(0x7f0000000d80)}, 0x4818, 0x7, 0x6, 0x0, 0x5, 0x17f, 0xfffc, 0x0, 0x2}, 0x0, 0x100000004, r1, 0xb) socket$kcm(0x2, 0x8000000000002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:41:40 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0xfea7, @fixed, 0x0, 0x2}, 0xe) 09:41:40 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x7f1d80, 0x0) 09:41:40 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 09:41:40 executing program 3: clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) setitimer(0x2, &(0x7f0000000200)={{0x0, 0x2710}, {0x0, r0/1000+10000}}, 0x0) 09:41:40 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0xfea7, @fixed, 0x0, 0x2}, 0xe) 09:41:40 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000011c0)={0x1, &(0x7f0000001180)=[{}]}) 09:41:41 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000180)=""/10, 0xa}, {&(0x7f0000000240)=""/102, 0x66}], 0x2, 0x0, 0x0) 09:41:41 executing program 5: socket$unix(0x1, 0x2, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0xffffffff}, 0x0, 0x0) select(0x40, &(0x7f0000000080)={0x9}, &(0x7f0000000180)={0x5}, 0x0, 0x0) 09:41:41 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) 09:41:41 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1d, 0x0, 0xd59}) 09:41:41 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0xfea7, @fixed, 0x0, 0x2}, 0xe) 09:41:42 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="faff7075a3c33fbea8202b6dffbb656d6f72a1fc"], 0x12) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x1f}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e80)={&(0x7f00000008c0)='xen_mc_flush\x00'}, 0x10) perf_event_open(&(0x7f0000000dc0)={0x2, 0x80, 0x5d, 0xdb, 0x0, 0x6, 0x0, 0x2051, 0x31002, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x28e, 0x0, @perf_bp={&(0x7f0000000d80)}, 0x4818, 0x7, 0x6, 0x0, 0x5, 0x17f, 0xfffc, 0x0, 0x2}, 0x0, 0x100000004, r1, 0xb) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:41:42 executing program 2: ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000000)={0x0, 0x0, {0x8, @usage, 0x0, 0x0, 0x0, 0x0, 0x7, 0x100, 0x0, @usage=0x1f, 0x9, 0x5, [0x0, 0xd4b1, 0x34, 0xffffffff7fffffff]}, {0x7, @struct, 0x0, 0x0, 0x6a089401, 0x100000000, 0x8, 0x3, 0x0, @usage, 0x0, 0xffff9112, [0xff, 0x0, 0x7, 0x1420, 0x400, 0x1]}, {0x20, @usage, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80, @struct={0x1}, 0x6, 0x0, [0x3, 0x3, 0x0, 0x0, 0x24]}, {0x8206, 0xfffffffffffffffe}}) semctl$IPC_INFO(0x0, 0x2, 0x3, &(0x7f00000004c0)=""/91) semget$private(0x0, 0x1, 0x200) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x14, 0x0, 0x100}, 0x14}}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000013c0), 0xffffffffffffffff) 09:41:42 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000600)={0x14, 0x0, 0xb34477ca07f4f837}, 0x14}}, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000980), r0) 09:41:42 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0xfea7, @fixed, 0x0, 0x2}, 0xe) 09:41:42 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000005b00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x5000}}], 0x2, 0x0) 09:41:42 executing program 4: sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, 0x0, 0x0) 09:41:42 executing program 2: setsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)={0x0, "722b18"}, 0xffffffffffffff98) 09:41:42 executing program 5: openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) 09:41:43 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) 09:41:43 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000003180), 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0xaaaaaaaaaaaab71, &(0x7f00000001c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYRESOCT]) 09:41:43 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000480)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) 09:41:43 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x0) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={0x0}}, 0x0) 09:41:44 executing program 5: setgroups(0x2, &(0x7f00000000c0)=[0xee01, 0xffffffffffffffff]) 09:41:44 executing program 4: ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000000)={0x0, 0x0, {0x8, @usage, 0x0, 0x0, 0x0, 0x0, 0x7, 0x100, 0x0, @usage=0x1f, 0x9, 0x5, [0x0, 0xd4b1, 0x34, 0xffffffff7fffffff]}, {0x7, @struct, 0x0, 0x0, 0x6a089401, 0x100000000, 0x8, 0x3, 0x0, @usage, 0x0, 0xffff9112, [0xff, 0x100000001, 0x7, 0x1420, 0x0, 0x1]}, {0x20, @usage=0x754, 0x0, 0x1, 0x4, 0xa9, 0x0, 0x4, 0x80, @struct, 0x0, 0x0, [0x3, 0x3, 0x0, 0x3ff]}, {0x8206, 0xfffffffffffffffe, 0x5}}) semctl$IPC_INFO(0x0, 0x2, 0x3, &(0x7f00000004c0)=""/91) semget$private(0x0, 0x1, 0x200) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000540)={0x1f, 0xd344, @none, 0x2, 0x1}, 0xe) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) syz_genetlink_get_family_id$batadv(&(0x7f00000013c0), 0xffffffffffffffff) 09:41:44 executing program 1: r0 = msgget$private(0x0, 0x0) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/43) 09:41:44 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="faff7075a3c33fbea8202b6dffbb656d6f72a1fc"], 0x12) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x1f}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e80)={&(0x7f00000008c0)='xen_mc_flush\x00'}, 0x10) perf_event_open(&(0x7f0000000dc0)={0x2, 0x80, 0x5d, 0xdb, 0x0, 0x6, 0x0, 0x2051, 0x31002, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x28e, 0x0, @perf_bp={&(0x7f0000000d80)}, 0x4818, 0x7, 0x6, 0x0, 0x5, 0x17f, 0xfffc, 0x0, 0x2}, 0x0, 0x100000004, r1, 0xb) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:41:44 executing program 2: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0xc0189436, &(0x7f0000000240)={'tunl0\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @local}}}}) 09:41:44 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000032c0), 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) 09:41:44 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000003440), 0x0, 0x0) ioctl$PPPIOCCONNECT(r0, 0x4004743a, 0x0) 09:41:44 executing program 1: socket$inet6(0xa, 0x0, 0x10000) 09:41:44 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000003440), 0x28400, 0x0) 09:41:44 executing program 2: r0 = socket$inet6(0x18, 0x4001, 0x0) getsockname$inet6(r0, 0x0, &(0x7f0000000080)) 09:41:45 executing program 5: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x0, 0x1f400000000000}) 09:41:45 executing program 4: utimensat(0xffffffffffffff9c, 0x0, 0x0, 0x4) 09:41:45 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="faff7075a3c33fbea8202b6dffbb656d6f72a1fc"], 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x1f}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e80)={&(0x7f00000008c0)='xen_mc_flush\x00'}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:41:45 executing program 1: mknodat(0xffffffffffffffff, 0x0, 0x0, 0xffffffff) 09:41:45 executing program 3: r0 = socket$inet6(0x18, 0x4001, 0x0) bind$inet6(r0, &(0x7f0000000080)={0x18, 0x1}, 0xc) 09:41:45 executing program 2: pipe(&(0x7f0000000000)) select(0x40, &(0x7f0000000000)={0x8}, &(0x7f0000000040)={0xff}, 0x0, 0x0) select(0x40, &(0x7f0000000380)={0x3dae}, 0x0, 0x0, 0x0) 09:41:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@abs={0x0, 0x0, 0x1}, 0x8) 09:41:46 executing program 4: shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) r0 = shmget(0x1, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmat(r0, &(0x7f0000ffc000/0x3000)=nil, 0x3000) 09:41:46 executing program 1: r0 = socket$inet6(0x18, 0x3, 0x0) getsockname$inet6(r0, 0x0, &(0x7f0000000080)) 09:41:46 executing program 3: readv(0xffffffffffffffff, &(0x7f0000000380)=[{0x0}], 0x1) 09:41:46 executing program 2: symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00') 09:41:46 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x6, 0x0) 09:41:46 executing program 4: r0 = socket$inet6(0x18, 0x3, 0x0) recvfrom(r0, 0x0, 0x0, 0x801, 0x0, 0x0) 09:41:46 executing program 1: r0 = msgget(0x0, 0x0) msgsnd(r0, &(0x7f0000000000)={0x0, "ad8712cea21c60cebff816b7789a11e9e800b870badb3449880ae0c3c933ff2b9f1a70e5db559b31022ca09b016bf178e9e1e7b3a9"}, 0x3d, 0x800) 09:41:47 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="faff7075a3c33fbea8202b6dffbb656d6f72a1fc"], 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x1f}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:41:47 executing program 3: socket$inet6(0x18, 0x3, 0x0) socket$inet6(0x18, 0x3, 0x0) 09:41:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000800)=[{0x0}, {&(0x7f00000003c0)="678191ec6cebff93246eec060fe6d9c2f2b14a812f5c828c7fa8a6a9e1e20b6da267691982c727217f226a6528d8b700bfeaaad83a2856f25e6127eb14b54777211a6976971d27e4bb0a8d0d9d41f144027a9dde2eb0c7d8e17134056675d323b4c7121f56db60cdeae74c8e415778025564ad42b2c2737bd26d968377e22580d2f422cfc1124912bc289228458d9ab41c", 0x91}], 0x2}, 0x18) 09:41:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x0) 09:41:47 executing program 2: r0 = shmget(0x1, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x0) shmat(r0, &(0x7f0000ffb000/0x1000)=nil, 0x0) 09:41:47 executing program 1: lchown(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00') 09:41:47 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x8, 0xffffffffffffffff) 09:41:48 executing program 4: symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00') lchown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 09:41:48 executing program 2: r0 = socket$inet6(0x18, 0x3, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:41:48 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) select(0x40, &(0x7f0000000080), &(0x7f00000000c0)={0x9}, 0x0, 0x0) select(0x40, &(0x7f0000000040), &(0x7f0000000100)={0x3}, 0x0, 0x0) 09:41:48 executing program 1: symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00') open$dir(&(0x7f0000000a80)='./file2\x00', 0x0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000a40)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) 09:41:48 executing program 3: r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffc000/0x1000)=nil, 0x0) 09:41:49 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="faff7075a3c33fbea8202b6dffbb656d6f72a1fc"], 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x1f}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:41:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r0, 0x0, 0x0) 09:41:49 executing program 5: fchmodat(0xffffffffffffffff, 0x0, 0x6c7b883038b07e69) 09:41:49 executing program 2: r0 = shmget(0x1, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/85) 09:41:49 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$dupfd(r0, 0x9, r0) 09:41:49 executing program 3: r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x3000) 09:41:49 executing program 4: shmget(0x1, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 09:41:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000003c0)="678191ec6cebff93246eec060fe6d9c2f2b14a812f5c828c7fa8a6a9e1e20b6da267691982c727217f226a6528d8b700bfeaaad83a2856f25e6127eb14b54777211a6976971d27e4bb0a8d0d9d41f144027a9dde2eb0c7d8e17134056675d323b4c7121f56db60cdeae74c8e415778025564ad42b2c2737bd26d968377e22580d2f422cfc1124912bc289228458d9ab41c", 0x91}], 0x3f}, 0x400) 09:41:49 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x10460, 0x0) 09:41:49 executing program 1: r0 = socket$inet6(0x18, 0x4001, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0x68, 0x0, 0x0) 09:41:49 executing program 3: r0 = socket$inet6(0x18, 0x2, 0x0) getsockname$inet6(r0, 0x0, &(0x7f0000000080)=0xffffffffffffff3e) 09:41:50 executing program 2: setuid(0xffffffffffffffff) setreuid(0x0, 0xffffffffffffffff) 09:41:50 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="faff7075a3c33fbea8202b6dffbb656d6f72a1fc"], 0x12) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:41:50 executing program 4: mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x10, 0xffffffffffffffff, 0x0) 09:41:50 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 09:41:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000800)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 09:41:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) 09:41:50 executing program 5: readv(0xffffffffffffffff, &(0x7f0000000380)=[{0x0}, {0x0}], 0x2) 09:41:50 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$dupfd(r0, 0x9, 0xffffffffffffffff) 09:41:50 executing program 4: mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x53419f9f4ef65009, 0x10, 0xffffffffffffffff, 0x0) 09:41:51 executing program 1: shmat(0x0, &(0x7f0000ffb000/0x5000)=nil, 0x0) shmdt(0x0) 09:41:51 executing program 3: r0 = socket$inet6(0x18, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0x18, 0x3}, 0xc) 09:41:51 executing program 2: r0 = socket$inet6(0x18, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0x68, 0x0, 0x0) 09:41:51 executing program 4: chown(&(0x7f0000000200)='.\x00', 0x0, 0x0) 09:41:51 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:41:51 executing program 5: pipe(&(0x7f0000000000)) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) 09:41:51 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x6, &(0x7f0000000000)) 09:41:51 executing program 3: r0 = socket$inet6(0x18, 0x4001, 0x0) setsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) 09:41:52 executing program 4: r0 = socket$inet6(0x18, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x66, 0x0, 0x0) 09:41:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000380)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0xa, 0x0, 0x0, &(0x7f0000000300)}, 0x0) 09:41:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000100)="09ea869502fadf4c5f3f4bcd922c1bb4b63a007de4869d0832f295287d313f996b622a9b26bd05dd8dc850f5c5db6f7f8572b1246896c668d81557a587ff22dce647b438f1640aed06572acebe3d2469d4a68294ba672850b842a4d97e1b347d78a48075fe463ad15c5c26f74e816dc3b8f93619f6a0ca338b1c5fac9a8fde0bf01e84b9b0c9d2a2ec330c21c7d417d1d248a66c82a4d26766fe14d7a6d40c1bb7c2ac872acdd19f3b97946934767fa2113394114aff08d3a4e8b9fa0da6760bc9d237b12f34be2e4df5d7b23a7ec481ce6ec93265a8a2dd57cacb71ee702e6fb9", 0xe1) 09:41:52 executing program 1: select(0x40, &(0x7f0000000980)={0x6}, 0x0, 0x0, &(0x7f0000000a40)={0x0, 0x6}) 09:41:52 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f00000006c0)={[{@utf8}, {@errors_continue}]}) 09:41:52 executing program 4: syz_usb_connect(0x0, 0x2d, &(0x7f0000000140)=ANY=[@ANYBLOB="1201000083147f20c814030092960102030109021b00010000040009040000015958a70009058703d7"], 0x0) syz_open_dev$evdev(&(0x7f0000000000), 0xe0, 0x0) 09:41:52 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x31}, 0x100) write$binfmt_elf64(r0, &(0x7f0000000900)=ANY=[], 0x100000530) 09:41:52 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240), 0x0, 0x0) write$nbd(r0, 0x0, 0x0) 09:41:53 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:41:53 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x0) flock(r0, 0x5) 09:41:53 executing program 3: ioctl$TIOCSBRK(0xffffffffffffffff, 0x2000747b) 09:41:53 executing program 1: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmat(r0, &(0x7f0000ffb000/0x2000)=nil, 0x5000) shmat(r0, &(0x7f0000ffa000/0x3000)=nil, 0xe000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) shmat(0x0, &(0x7f0000ffb000/0x2000)=nil, 0x4000) [ 1132.198756][T12725] usb 5-1: new high-speed USB device number 19 using dummy_hcd 09:41:53 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xaece, 0x0) 09:41:53 executing program 3: syz_open_dev$loop(&(0x7f0000000100), 0x0, 0xc03) [ 1132.481771][T12725] usb 5-1: Using ep0 maxpacket: 32 09:41:53 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) [ 1132.630393][T12725] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x87 has an invalid bInterval 0, changing to 7 [ 1132.810793][T12725] usb 5-1: New USB device found, idVendor=14c8, idProduct=0003, bcdDevice=96.92 [ 1132.820230][T12725] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1132.829071][T12725] usb 5-1: Product: syz [ 1132.833378][T12725] usb 5-1: Manufacturer: syz [ 1132.838114][T12725] usb 5-1: SerialNumber: syz 09:41:54 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:41:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x1d7, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='highspeed\x00', 0xa) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x23}}, 0x5c) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x4}, 0x0) [ 1133.086478][T12725] usb 5-1: config 0 descriptor?? [ 1133.163642][T12725] input: syz syz as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.0/input/input5 [ 1133.416216][T12725] usb 5-1: USB disconnect, device number 19 [ 1133.857228][T16527] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 1134.179603][T12725] usb 5-1: new high-speed USB device number 20 using dummy_hcd [ 1134.317360][ T1202] ieee802154 phy0 wpan0: encryption failed: -22 [ 1134.324256][ T1202] ieee802154 phy1 wpan1: encryption failed: -22 [ 1134.449048][T12725] usb 5-1: Using ep0 maxpacket: 32 [ 1134.570492][T12725] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x87 has an invalid bInterval 0, changing to 7 [ 1134.780316][T12725] usb 5-1: New USB device found, idVendor=14c8, idProduct=0003, bcdDevice=96.92 [ 1134.789925][T12725] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1134.800169][T12725] usb 5-1: Product: syz [ 1134.804479][T12725] usb 5-1: Manufacturer: syz [ 1134.809794][T12725] usb 5-1: SerialNumber: syz [ 1134.840067][T12725] usb 5-1: config 0 descriptor?? [ 1134.902819][T12725] input: syz syz as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.0/input/input6 [ 1134.986465][T12725] usb 5-1: USB disconnect, device number 20 [ 1134.992805][ C1] usbtouchscreen 5-1:0.0: usbtouch_irq - usb_submit_urb failed with result: -19 09:41:56 executing program 4: r0 = socket(0x800000018, 0x2, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x2088611, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000001640)='/proc/self/exe\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x10, r2, 0x0) preadv(r2, &(0x7f00000015c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x10, r1, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000080)={{0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}}) bind$unix(r0, &(0x7f0000000080)=@abs={0x1f95d27d48731892}, 0x1c) 09:41:56 executing program 1: r0 = socket(0x800000018, 0x2, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x2088611, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000001640)='/proc/self/exe\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x10, r2, 0x0) preadv(r2, &(0x7f00000015c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x10, r1, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000080)={{0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x150, 0x2}}) bind$unix(r0, &(0x7f0000000080)=@abs={0x1f95d27d48731892}, 0x1c) 09:41:56 executing program 3: r0 = msgget$private(0x0, 0x60) msgsnd(r0, &(0x7f0000001c00)=ANY=[@ANYBLOB="02"], 0x1008, 0x0) msgctl$IPC_RMID(r0, 0x0) 09:41:56 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xaece, 0x0) 09:41:56 executing program 2: r0 = socket(0x800000018, 0x2, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000080)={{0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}}) bind$unix(r0, &(0x7f0000000080)=@abs={0x1f95d27d48731892}, 0x1c) 09:41:56 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:41:56 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:41:56 executing program 2: mlock(&(0x7f0000feb000/0x13000)=nil, 0x13000) fork() mmap(&(0x7f0000fea000/0x1000)=nil, 0x1000, 0x0, 0x1a90, 0xffffffffffffffff, 0x0) 09:41:57 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x1d7, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='highspeed\x00', 0xa) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x23}}, 0x5c) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) 09:41:57 executing program 3: r0 = msgget$private(0x0, 0x60) msgsnd(r0, &(0x7f0000001c00)=ANY=[@ANYBLOB="02"], 0x1008, 0x0) msgctl$IPC_RMID(r0, 0x0) 09:41:57 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xaece, 0x0) 09:41:57 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000006c0), 0x0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) request_key(0x0, 0x0, 0x0, 0x0) 09:41:57 executing program 2: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}, {[], {}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x0, 0x1}}}}}]}}]}}, 0x0) [ 1136.464761][T16585] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 09:41:57 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:41:57 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xaece, 0x0) [ 1136.651872][ T24] audit: type=1800 audit(1639129317.899:61): pid=16592 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=15223 res=0 errno=0 09:41:58 executing program 3: r0 = socket$inet6(0x18, 0x1, 0x0) sendmsg(r0, &(0x7f0000001e40)={0x0, 0xa, 0x0, 0x0, 0xfffffffffffffffe, 0x280}, 0x0) [ 1136.795087][ T24] audit: type=1800 audit(1639129318.009:62): pid=16592 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=15223 res=0 errno=0 09:41:58 executing program 1: r0 = socket(0x800000018, 0x3, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000080)={{0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}}) bind$unix(r0, &(0x7f0000000080)=@abs={0x1f95d27d48731892}, 0x1c) 09:41:58 executing program 4: recvmsg(0xffffffffffffffff, 0x0, 0x80000122) [ 1137.261626][T12725] usb 3-1: new high-speed USB device number 13 using dummy_hcd 09:41:58 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:41:58 executing program 3: shmat(0x0, &(0x7f0000fec000/0x12000)=nil, 0x4000) shmat(0x0, &(0x7f0000a61000/0x4000)=nil, 0x4000) shmat(0x0, &(0x7f0000fed000/0x1000)=nil, 0x5000) 09:41:58 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xaece, 0x0) 09:41:58 executing program 4: r0 = socket(0x800000018, 0x3, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000080)={{0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}}) bind$unix(r0, &(0x7f0000000080)=@abs={0x1f95d27d48731892}, 0x1c) 09:41:58 executing program 1: r0 = socket(0x800000018, 0x2, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000080)={{0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x150, 0x2}}) bind$unix(r0, &(0x7f0000000080)=@abs={0x1f95d27d48731892}, 0x1c) [ 1137.651313][T12725] usb 3-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1137.851480][T12725] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1137.861105][T12725] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1137.871429][T12725] usb 3-1: Product: syz [ 1137.875726][T12725] usb 3-1: Manufacturer: syz [ 1137.880850][T12725] usb 3-1: SerialNumber: syz 09:41:59 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x2000, 0x0) setuid(0xffffffffffffffff) fchownat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) [ 1138.125975][T16598] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1138.182532][T12725] cdc_ether: probe of 3-1:1.0 failed with error -22 [ 1138.426053][ T8329] usb 3-1: USB disconnect, device number 13 [ 1139.248741][ T8329] usb 3-1: new high-speed USB device number 14 using dummy_hcd [ 1139.610333][ T8329] usb 3-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1139.796218][ T8329] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1139.805642][ T8329] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1139.815899][ T8329] usb 3-1: Product: syz [ 1139.820552][ T8329] usb 3-1: Manufacturer: syz [ 1139.825287][ T8329] usb 3-1: SerialNumber: syz [ 1139.865380][T16598] raw-gadget gadget: fail, usb_ep_enable returned -22 09:42:01 executing program 2: r0 = open(&(0x7f0000000340)='./file0\x00', 0x300, 0x0) fcntl$lock(r0, 0x9, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000300010009}) 09:42:01 executing program 4: r0 = socket(0x800000018, 0x3, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000080)={{0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff}}) bind$unix(r0, &(0x7f0000000080)=@abs={0x1f95d27d48731892}, 0x1c) 09:42:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) sendmmsg(r0, &(0x7f0000000000), 0x10, 0x0) 09:42:01 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xaece, 0x0) 09:42:01 executing program 3: r0 = socket(0x800000018, 0x3, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000080)={{0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x150}}) bind$unix(r0, &(0x7f0000000080)=@abs={0x1f95d27d48731892}, 0x1c) 09:42:01 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) [ 1139.940162][ T8329] usb 3-1: can't set config #1, error -71 [ 1139.987568][ T8329] usb 3-1: USB disconnect, device number 14 09:42:01 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, 0x0) [ 1140.439100][T12725] usb 2-1: new high-speed USB device number 13 using dummy_hcd 09:42:01 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xaece, 0x0) 09:42:01 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x0, 0x40942) write$uinput_user_dev(r0, &(0x7f0000000d40)={'syz1\x00'}, 0x45c) 09:42:01 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) [ 1140.658482][T12725] usb 2-1: device descriptor read/64, error 18 09:42:01 executing program 2: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000002800)={0x0, 0x0, 0x0, 0x40000}, 0x0) [ 1140.928436][T12725] usb 2-1: new high-speed USB device number 14 using dummy_hcd 09:42:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setuid(0xee01) rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') [ 1141.128730][T12725] usb 2-1: device descriptor read/64, error 18 09:42:02 executing program 4: r0 = socket(0x800000018, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x4, &(0x7f0000000000)=0x4, 0x4) bind$unix(r0, &(0x7f0000000080)=@abs={0x1f95d27d48731892}, 0x1c) [ 1141.254337][T12725] usb usb2-port1: attempt power cycle 09:42:02 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) [ 1141.679871][T12725] usb 2-1: new high-speed USB device number 15 using dummy_hcd [ 1141.778992][T12725] usb 2-1: Invalid ep0 maxpacket: 0 [ 1141.939054][T12725] usb 2-1: new high-speed USB device number 16 using dummy_hcd [ 1142.030897][T12725] usb 2-1: Invalid ep0 maxpacket: 0 [ 1142.049826][T12725] usb usb2-port1: unable to enumerate USB device 09:42:04 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8000, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000000), 0x64}], 0x1000000000000013) 09:42:04 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:42:04 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r0, 0xaece, 0x0) 09:42:04 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f0000000500), 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000280), r0) 09:42:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@func={0x1}]}, {0x0, [0x5f, 0x2e, 0x2e, 0x2e, 0x30, 0x5f, 0x2e, 0x0]}}, &(0x7f0000000100)=""/134, 0x2e, 0x86, 0x1}, 0x20) 09:42:04 executing program 4: r0 = socket$inet(0x2, 0x3, 0x4) setsockopt$inet_buf(r0, 0x0, 0x13, &(0x7f0000000280)='k', 0x1) 09:42:04 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r0, 0xaece, 0x0) 09:42:04 executing program 4: syz_io_uring_setup(0x6dfa, &(0x7f0000000140), &(0x7f0000002000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1000007, 0x4002132, 0xffffffffffffffff, 0x10000000) 09:42:04 executing program 3: syz_usb_connect(0x0, 0x63, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x96, 0x46, 0x13, 0x40, 0x1b3d, 0x118, 0x9faa, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x51, 0x1, 0x0, 0x0, 0xa0, 0x5, [{{0x9, 0x4, 0xab, 0x4, 0x3, 0xb9, 0x37, 0x78, 0x0, [@cdc_ncm={{0x5}, {0x5}, {0xd}, {0x6, 0x24, 0x1a, 0xffff}}], [{{0x9, 0x5, 0x0, 0x8, 0x3ff}}, {{0x9, 0x5, 0x1, 0x2}}, {{0x9, 0x5, 0xf, 0x2, 0x0, 0x7, 0x0, 0x0, [@uac_iso={0x7}]}}]}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000300)={0xa, 0x6, 0x300}, 0x8, &(0x7f0000000340)={0x5, 0xf, 0x8, 0x1, [@ptm_cap={0x3}]}}) 09:42:04 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001600)=[{{&(0x7f0000000300)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00', 0x87}, 0x1c, 0x0, 0x0, &(0x7f0000001b40)=ANY=[@ANYBLOB="14000000000000002900000034000000200000000000000024000000000000002900000032000000fc0100"/53, @ANYRES32], 0x40}}], 0x1, 0x0) 09:42:04 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:42:05 executing program 1: syz_open_dev$evdev(&(0x7f0000001780), 0x0, 0x0) syz_io_uring_setup(0x6dfa, &(0x7f0000000000), &(0x7f0000002000/0x1000)=nil, &(0x7f0000000000/0x9000)=nil, &(0x7f0000000080), &(0x7f0000000100)) 09:42:05 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r0, 0xaece, 0x0) 09:42:05 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, 0x0) clone3(&(0x7f0000000440)={0x8800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0x0], 0x1}, 0x58) 09:42:05 executing program 2: syz_io_uring_setup(0x39eb, &(0x7f0000000280), &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000940)={0x0, 0x0, "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", "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"}) syz_io_uring_setup(0x6d9d, &(0x7f0000000000)={0x0, 0xf6cc}, &(0x7f0000ff0000/0x4000)=nil, &(0x7f0000001000/0x4000)=nil, &(0x7f0000000080), &(0x7f0000000100)) 09:42:05 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) [ 1144.448984][ T8301] usb 4-1: new high-speed USB device number 18 using dummy_hcd [ 1144.810330][ T8301] usb 4-1: config 0 has an invalid interface number: 171 but max is 0 [ 1144.819293][ T8301] usb 4-1: config 0 has no interface number 0 [ 1144.825528][ T8301] usb 4-1: config 0 interface 171 altsetting 4 has an invalid endpoint with address 0x0, skipping [ 1144.836576][ T8301] usb 4-1: config 0 interface 171 altsetting 4 endpoint 0x1 has invalid wMaxPacketSize 0 [ 1144.846723][ T8301] usb 4-1: config 0 interface 171 altsetting 4 bulk endpoint 0x1 has invalid maxpacket 0 [ 1144.857149][ T8301] usb 4-1: config 0 interface 171 altsetting 4 endpoint 0xF has invalid wMaxPacketSize 0 [ 1144.867309][ T8301] usb 4-1: config 0 interface 171 altsetting 4 bulk endpoint 0xF has invalid maxpacket 0 [ 1144.877712][ T8301] usb 4-1: config 0 interface 171 has no altsetting 0 09:42:06 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/prev\x00') write$uinput_user_dev(r0, 0x0, 0x0) 09:42:06 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_RUN(r1, 0xaece, 0x0) 09:42:06 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) [ 1145.477302][ T8301] usb 4-1: New USB device found, idVendor=1b3d, idProduct=0118, bcdDevice=9f.aa [ 1145.486830][ T8301] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1145.495257][ T8301] usb 4-1: Product: syz [ 1145.499738][ T8301] usb 4-1: Manufacturer: syz [ 1145.504468][ T8301] usb 4-1: SerialNumber: syz 09:42:06 executing program 2: r0 = socket$inet(0x2, 0x3, 0x4) setsockopt$inet_buf(r0, 0x0, 0xb, 0x0, 0x0) [ 1145.754216][ T8301] usb 4-1: config 0 descriptor?? [ 1145.837760][ T8301] ftdi_sio 4-1:0.171: FTDI USB Serial Device converter detected [ 1145.849137][ T8301] usb 4-1: Detected FT-X [ 1145.857436][ T8301] ftdi_sio ttyUSB0: Overriding wMaxPacketSize on endpoint 1 [ 1145.865410][ T8301] ftdi_sio ttyUSB0: Overriding wMaxPacketSize on endpoint 15 [ 1146.096108][ T8301] ftdi_sio ttyUSB0: Unable to read latency timer: -71 [ 1146.155570][ T8301] ftdi_sio ttyUSB0: Unable to write latency timer: -71 [ 1146.206588][ T8301] ftdi_sio 4-1:0.171: GPIO initialisation failed: -71 [ 1146.272894][ T8301] usb 4-1: FTDI USB Serial Device converter now attached to ttyUSB0 [ 1146.346471][ T8301] usb 4-1: USB disconnect, device number 18 [ 1146.403978][ T8301] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 1146.415664][ T8301] ftdi_sio 4-1:0.171: device disconnected [ 1146.981526][ T8301] usb 4-1: new high-speed USB device number 19 using dummy_hcd [ 1147.350172][ T8301] usb 4-1: config 0 has an invalid interface number: 171 but max is 0 [ 1147.358873][ T8301] usb 4-1: config 0 has no interface number 0 [ 1147.365102][ T8301] usb 4-1: config 0 interface 171 altsetting 4 has an invalid endpoint with address 0x0, skipping [ 1147.376297][ T8301] usb 4-1: config 0 interface 171 altsetting 4 endpoint 0x1 has invalid wMaxPacketSize 0 [ 1147.386650][ T8301] usb 4-1: config 0 interface 171 altsetting 4 bulk endpoint 0x1 has invalid maxpacket 0 [ 1147.399529][ T8301] usb 4-1: config 0 interface 171 altsetting 4 endpoint 0xF has invalid wMaxPacketSize 0 [ 1147.410119][ T8301] usb 4-1: config 0 interface 171 altsetting 4 bulk endpoint 0xF has invalid maxpacket 0 [ 1147.420385][ T8301] usb 4-1: config 0 interface 171 has no altsetting 0 09:42:08 executing program 3: clock_gettime(0x0, &(0x7f00000003c0)={0x0}) pselect6(0x40, &(0x7f0000000300), 0x0, &(0x7f0000000380)={0x6}, &(0x7f0000000400)={r0}, 0x0) 09:42:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func={0x1}]}}, &(0x7f0000000100)=""/134, 0x26, 0x86, 0x1}, 0x20) 09:42:08 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_RUN(r1, 0xaece, 0x0) 09:42:08 executing program 2: r0 = socket$inet(0x2, 0x3, 0x4) setsockopt$inet_buf(r0, 0x0, 0x31, &(0x7f0000000280)="6b7ebf6d", 0x4) 09:42:08 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x40) 09:42:08 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) [ 1147.773592][ T8301] usb 4-1: New USB device found, idVendor=1b3d, idProduct=0118, bcdDevice=9f.aa [ 1147.783152][ T8301] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1147.937640][ T8301] usb 4-1: config 0 descriptor?? [ 1147.972654][ T8301] usb 4-1: can't set config #0, error -71 [ 1148.042952][ T8301] usb 4-1: USB disconnect, device number 19 09:42:09 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_RUN(r1, 0xaece, 0x0) 09:42:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000100)=""/134, 0x26, 0x86, 0x1}, 0x20) 09:42:09 executing program 1: r0 = socket$inet(0x2, 0x3, 0x4) setsockopt$inet_buf(r0, 0x0, 0x10, 0x0, 0x16) 09:42:09 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:42:09 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000000140), 0x0, 0x20f01) write$rfkill(r0, &(0x7f0000000000), 0x8) write$cgroup_type(r0, &(0x7f0000000100), 0xfffffdef) 09:42:10 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="48000000abbf69"], 0x48}}, 0x0) 09:42:10 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000020c0)=[{{&(0x7f0000000080)={0xa, 0x4e21, 0x0, @empty, 0x5}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000d40)="cc", 0x1}, {0x0}, {0x0}, {&(0x7f00000001c0)='~', 0x1}], 0x4, &(0x7f0000000380)=[@rthdrdstopts={{0x30, 0x29, 0x37, {0x0, 0x2, '\x00', [@hao={0xc9, 0x10, @private1}]}}}], 0x30}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@rthdr_2292={{0x28, 0x29, 0x39, {0x0, 0x2, 0x0, 0x0, 0x0, [@local]}}}], 0x28}}], 0x2, 0x4000800) 09:42:10 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:42:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xaece, 0x0) 09:42:10 executing program 1: syz_open_procfs(0x0, &(0x7f0000000180)='net/rt_cache\x00') 09:42:11 executing program 2: r0 = socket$inet(0x2, 0x3, 0x4) setsockopt$inet_buf(r0, 0x0, 0x26, 0x0, 0x0) 09:42:11 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:42:11 executing program 1: r0 = socket$inet(0x2, 0x3, 0x4) setsockopt$inet_buf(r0, 0x0, 0x23, 0x0, 0x0) 09:42:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xaece, 0x0) 09:42:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x1e) 09:42:11 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000140), 0x0, 0x20f01) write$cgroup_type(r0, &(0x7f0000000100), 0x9) [ 1195.755375][ T1202] ieee802154 phy0 wpan0: encryption failed: -22 [ 1195.762284][ T1202] ieee802154 phy1 wpan1: encryption failed: -22 09:43:29 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) read$rfkill(r0, &(0x7f0000000080), 0xfdef) [ 1228.070436][T13766] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 09:43:29 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r0, 0x107, 0x6, 0x0, &(0x7f0000000780)) 09:43:29 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:43:29 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xaece, 0x0) 09:43:29 executing program 3: getrusage(0x0, &(0x7f0000000000)) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x1ffff000, 0x0, 0xe132, 0xffffffffffffffff, 0x10000000) 09:43:29 executing program 2: r0 = io_uring_setup(0x2a48, &(0x7f00000012c0)) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x10000000) r1 = syz_open_dev$mouse(&(0x7f0000000900), 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x100010, r1, 0x10000000) [ 1228.217814][T13766] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 09:43:29 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\xf4\xb4\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf0&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xbc\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0xa1, 0x7f, "fe6ef093b79368c8ee953bec75eb0000547a8aaaccf8e4e16f2eb193bf42263de9a009ae9a871f0624d3e3fd5396aa5e70bcf78eefde8cc9c1f5d04743cfae", 0xfffefffffffffffd}, 0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x6044080) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 09:43:29 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xaece, 0x0) [ 1228.450298][T13766] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 09:43:29 executing program 3: keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000540)=""/4096, 0x2) 09:43:29 executing program 1: r0 = socket$inet(0x2, 0x3, 0x4) setsockopt$inet_buf(r0, 0x0, 0x14, &(0x7f0000000280)='k', 0x1) 09:43:29 executing program 2: r0 = socket$inet(0x2, 0x3, 0x4) setsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000080)="1fcfe27c32c983de42cfe7ee184cefff", 0x10) [ 1228.670907][T13766] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 09:43:30 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0xffffffffffff0162) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x1, 0x7, 0x0, 0x2000000, 0x5}, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) getpgrp(0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x200, 0x0) r4 = open(&(0x7f0000001340)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x10000) [ 1229.795745][ T24] audit: type=1804 audit(1639129411.037:63): pid=16940 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir721625323/syzkaller.Uf3HyD/413/bus" dev="sda1" ino=14090 res=1 errno=0 [ 1230.791534][T16946] not chained 10000 origins [ 1230.796233][T16946] CPU: 0 PID: 16946 Comm: syz-executor.3 Not tainted 5.16.0-rc3-syzkaller #0 [ 1230.798302][T16946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1230.798302][T16946] Call Trace: [ 1230.798302][T16946] [ 1230.798302][T16946] dump_stack_lvl+0x1ff/0x28e [ 1230.798302][T16946] dump_stack+0x25/0x28 [ 1230.798302][T16946] kmsan_internal_chain_origin+0x7a/0x110 [ 1230.798302][T16946] ? kmsan_internal_unpoison_memory+0x10/0x20 [ 1230.798302][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1230.798302][T16946] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1230.798302][T16946] ? __unix_dgram_recvmsg+0x1a18/0x1c30 [ 1230.798302][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1230.798302][T16946] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1230.798302][T16946] ? should_fail+0x75/0x9c0 [ 1230.798302][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1230.798302][T16946] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1230.798302][T16946] ? kmsan_internal_unpoison_memory+0x10/0x20 [ 1230.798302][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1230.798302][T16946] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1230.798302][T16946] __msan_chain_origin+0xbf/0x140 [ 1230.798302][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1230.798302][T16946] get_compat_msghdr+0x108/0x2c0 [ 1230.798302][T16946] ? __sys_recvmmsg+0x51c/0x6f0 [ 1230.798302][T16946] do_recvmmsg+0x1063/0x2120 [ 1230.798302][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1230.798302][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1230.798302][T16946] ? kmsan_internal_check_memory+0x9a/0x560 [ 1230.798302][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1230.798302][T16946] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1230.798302][T16946] ? __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1230.798302][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1230.798302][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1230.798302][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1230.798302][T16946] do_fast_syscall_32+0x34/0x70 [ 1230.798302][T16946] do_SYSENTER_32+0x1b/0x20 [ 1230.798302][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1230.798302][T16946] RIP: 0023:0xf6eea549 [ 1230.798302][T16946] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 [ 1230.798302][T16946] RSP: 002b:00000000f5a605fc EFLAGS: 00000296 ORIG_RAX: 0000000000000151 [ 1230.798302][T16946] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000200000c0 [ 1230.798302][T16946] RDX: 0000000000010106 RSI: 0000000000000002 RDI: 0000000000000000 [ 1230.798302][T16946] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1230.798302][T16946] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1230.798302][T16946] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1230.798302][T16946] [ 1231.074579][T16946] Uninit was stored to memory at: [ 1231.080081][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1231.085253][T16946] get_compat_msghdr+0x108/0x2c0 [ 1231.090393][T16946] do_recvmmsg+0x1063/0x2120 [ 1231.095033][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1231.099981][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1231.106372][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1231.111612][T16946] do_fast_syscall_32+0x34/0x70 [ 1231.116521][T16946] do_SYSENTER_32+0x1b/0x20 [ 1231.121244][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1231.127642][T16946] [ 1231.130134][T16946] Uninit was stored to memory at: [ 1231.135237][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1231.140552][T16946] get_compat_msghdr+0x108/0x2c0 [ 1231.145549][T16946] do_recvmmsg+0x1063/0x2120 [ 1231.150511][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1231.155265][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1231.161810][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1231.166886][T16946] do_fast_syscall_32+0x34/0x70 [ 1231.172025][T16946] do_SYSENTER_32+0x1b/0x20 [ 1231.176579][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1231.183110][T16946] [ 1231.185444][T16946] Uninit was stored to memory at: [ 1231.190682][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1231.195842][T16946] get_compat_msghdr+0x108/0x2c0 [ 1231.200982][T16946] do_recvmmsg+0x1063/0x2120 [ 1231.205610][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1231.210479][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1231.216881][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1231.222370][T16946] do_fast_syscall_32+0x34/0x70 [ 1231.227277][T16946] do_SYSENTER_32+0x1b/0x20 [ 1231.231978][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1231.238520][T16946] [ 1231.240943][T16946] Uninit was stored to memory at: [ 1231.246040][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1231.251455][T16946] get_compat_msghdr+0x108/0x2c0 [ 1231.256628][T16946] do_recvmmsg+0x1063/0x2120 [ 1231.261408][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1231.266130][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1231.272680][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1231.277762][T16946] do_fast_syscall_32+0x34/0x70 [ 1231.282815][T16946] do_SYSENTER_32+0x1b/0x20 [ 1231.287378][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1231.293917][T16946] [ 1231.296254][T16946] Uninit was stored to memory at: [ 1231.301507][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1231.306693][T16946] get_compat_msghdr+0x108/0x2c0 [ 1231.311856][T16946] do_recvmmsg+0x1063/0x2120 [ 1231.316495][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1231.321360][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1231.327755][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1231.333072][T16946] do_fast_syscall_32+0x34/0x70 [ 1231.337966][T16946] do_SYSENTER_32+0x1b/0x20 [ 1231.342672][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1231.349197][T16946] [ 1231.351542][T16946] Uninit was stored to memory at: [ 1231.356724][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1231.362038][T16946] get_compat_msghdr+0x108/0x2c0 [ 1231.367034][T16946] do_recvmmsg+0x1063/0x2120 [ 1231.371817][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1231.376543][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1231.383084][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1231.388161][T16946] do_fast_syscall_32+0x34/0x70 [ 1231.393198][T16946] do_SYSENTER_32+0x1b/0x20 [ 1231.397749][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1231.404290][T16946] [ 1231.406627][T16946] Uninit was stored to memory at: [ 1231.411901][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1231.417072][T16946] get_compat_msghdr+0x108/0x2c0 [ 1231.422236][T16946] do_recvmmsg+0x1063/0x2120 [ 1231.426874][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1231.431764][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1231.438388][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1231.443476][T16946] do_fast_syscall_32+0x34/0x70 [ 1231.448518][T16946] do_SYSENTER_32+0x1b/0x20 [ 1231.453062][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1231.459666][T16946] [ 1231.461998][T16946] Local variable msg_sys created at: [ 1231.467292][T16946] do_recvmmsg+0xc1/0x2120 [ 1231.471898][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1232.054134][T16939] not chained 20000 origins [ 1232.059085][T16939] CPU: 1 PID: 16939 Comm: syz-executor.3 Not tainted 5.16.0-rc3-syzkaller #0 [ 1232.067901][T16939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1232.068805][T16939] Call Trace: [ 1232.078438][T16939] [ 1232.078438][T16939] dump_stack_lvl+0x1ff/0x28e [ 1232.078438][T16939] dump_stack+0x25/0x28 [ 1232.078438][T16939] kmsan_internal_chain_origin+0x7a/0x110 [ 1232.078438][T16939] ? kmsan_internal_unpoison_memory+0x10/0x20 [ 1232.078438][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1232.078438][T16939] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1232.078438][T16939] ? __unix_dgram_recvmsg+0x1a18/0x1c30 [ 1232.078438][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1232.078438][T16939] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1232.078438][T16939] ? should_fail+0x75/0x9c0 [ 1232.078438][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1232.078438][T16939] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1232.078438][T16939] ? kmsan_internal_unpoison_memory+0x10/0x20 [ 1232.078438][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1232.078438][T16939] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1232.078438][T16939] __msan_chain_origin+0xbf/0x140 [ 1232.168424][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1232.168424][T16939] get_compat_msghdr+0x108/0x2c0 [ 1232.168424][T16939] ? __sys_recvmmsg+0x51c/0x6f0 [ 1232.168424][T16939] do_recvmmsg+0x1063/0x2120 [ 1232.168424][T16939] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1232.168424][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1232.198450][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1232.198450][T16939] ? kmsan_internal_check_memory+0x9a/0x560 [ 1232.198450][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1232.198450][T16939] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1232.198450][T16939] ? __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1232.198450][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1232.198450][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1232.198450][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1232.198450][T16939] do_fast_syscall_32+0x34/0x70 [ 1232.198450][T16939] do_SYSENTER_32+0x1b/0x20 [ 1232.198450][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1232.198450][T16939] RIP: 0023:0xf6eea549 [ 1232.198450][T16939] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 [ 1232.198450][T16939] RSP: 002b:00000000f5ac35fc EFLAGS: 00000296 ORIG_RAX: 0000000000000151 [ 1232.198450][T16939] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000200000c0 [ 1232.198450][T16939] RDX: 0000000000010106 RSI: 0000000000000002 RDI: 0000000000000000 [ 1232.198450][T16939] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1232.198450][T16939] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1232.198450][T16939] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1232.198450][T16939] [ 1232.344689][T16939] Uninit was stored to memory at: [ 1232.350543][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1232.355717][T16939] get_compat_msghdr+0x108/0x2c0 [ 1232.360903][T16939] do_recvmmsg+0x1063/0x2120 [ 1232.365532][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1232.370442][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1232.376841][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1232.382087][T16939] do_fast_syscall_32+0x34/0x70 [ 1232.386988][T16939] do_SYSENTER_32+0x1b/0x20 [ 1232.391726][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1232.398106][T16939] [ 1232.400632][T16939] Uninit was stored to memory at: [ 1232.405733][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1232.411067][T16939] get_compat_msghdr+0x108/0x2c0 [ 1232.416076][T16939] do_recvmmsg+0x1063/0x2120 [ 1232.420885][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1232.425600][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1232.432175][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1232.437341][T16939] do_fast_syscall_32+0x34/0x70 [ 1232.442417][T16939] do_SYSENTER_32+0x1b/0x20 [ 1232.446968][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1232.453527][T16939] [ 1232.455860][T16939] Uninit was stored to memory at: [ 1232.461136][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1232.466302][T16939] get_compat_msghdr+0x108/0x2c0 [ 1232.471469][T16939] do_recvmmsg+0x1063/0x2120 [ 1232.476188][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1232.481089][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1232.487588][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1232.492871][T16939] do_fast_syscall_32+0x34/0x70 [ 1232.497879][T16939] do_SYSENTER_32+0x1b/0x20 [ 1232.502652][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1232.509231][T16939] [ 1232.511566][T16939] Uninit was stored to memory at: [ 1232.516662][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1232.522002][T16939] get_compat_msghdr+0x108/0x2c0 [ 1232.526992][T16939] do_recvmmsg+0x1063/0x2120 [ 1232.531807][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1232.536526][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1232.543101][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1232.548175][T16939] do_fast_syscall_32+0x34/0x70 [ 1232.553304][T16939] do_SYSENTER_32+0x1b/0x20 [ 1232.557879][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1232.564540][T16939] [ 1232.566873][T16939] Uninit was stored to memory at: [ 1232.572162][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1232.577324][T16939] get_compat_msghdr+0x108/0x2c0 [ 1232.582591][T16939] do_recvmmsg+0x1063/0x2120 [ 1232.587221][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1232.592129][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1232.598713][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1232.603812][T16939] do_fast_syscall_32+0x34/0x70 [ 1232.608955][T16939] do_SYSENTER_32+0x1b/0x20 [ 1232.613507][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1232.620115][T16939] [ 1232.622448][T16939] Uninit was stored to memory at: [ 1232.627547][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1232.632887][T16939] get_compat_msghdr+0x108/0x2c0 [ 1232.637877][T16939] do_recvmmsg+0x1063/0x2120 [ 1232.642697][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1232.647418][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1232.654002][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1232.659337][T16939] do_fast_syscall_32+0x34/0x70 [ 1232.664256][T16939] do_SYSENTER_32+0x1b/0x20 [ 1232.668974][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1232.675364][T16939] [ 1232.677721][T16939] Uninit was stored to memory at: [ 1232.683023][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1232.688393][T16939] get_compat_msghdr+0x108/0x2c0 [ 1232.693395][T16939] do_recvmmsg+0x1063/0x2120 [ 1232.698035][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1232.703113][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1232.709634][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1232.714805][T16939] do_fast_syscall_32+0x34/0x70 [ 1232.719823][T16939] do_SYSENTER_32+0x1b/0x20 [ 1232.724373][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1232.731021][T16939] [ 1232.733365][T16939] Local variable msg_sys created at: [ 1232.738944][T16939] do_recvmmsg+0xc1/0x2120 [ 1232.743403][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1233.234115][T13766] device hsr_slave_0 left promiscuous mode [ 1233.289580][T13766] device hsr_slave_1 left promiscuous mode [ 1233.312474][T13766] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1233.320528][T13766] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1233.406333][T13766] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1233.414154][T13766] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1233.472563][T13766] device bridge_slave_1 left promiscuous mode [ 1233.479720][T13766] bridge0: port 2(bridge_slave_1) entered disabled state [ 1233.524422][T13766] device bridge_slave_0 left promiscuous mode [ 1233.531604][T13766] bridge0: port 1(bridge_slave_0) entered disabled state [ 1233.541595][T16946] not chained 30000 origins [ 1233.546135][T16946] CPU: 1 PID: 16946 Comm: syz-executor.3 Not tainted 5.16.0-rc3-syzkaller #0 [ 1233.548559][T16946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1233.564031][T16946] Call Trace: [ 1233.564031][T16946] [ 1233.564031][T16946] dump_stack_lvl+0x1ff/0x28e [ 1233.564031][T16946] dump_stack+0x25/0x28 [ 1233.579627][T16946] kmsan_internal_chain_origin+0x7a/0x110 [ 1233.579627][T16946] ? kmsan_internal_unpoison_memory+0x10/0x20 [ 1233.591437][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1233.591437][T16946] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1233.591437][T16946] ? __unix_dgram_recvmsg+0x1a18/0x1c30 [ 1233.591437][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1233.591437][T16946] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1233.591437][T16946] ? should_fail+0x75/0x9c0 [ 1233.591437][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1233.591437][T16946] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1233.591437][T16946] ? kmsan_internal_unpoison_memory+0x10/0x20 [ 1233.591437][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1233.591437][T16946] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1233.591437][T16946] __msan_chain_origin+0xbf/0x140 [ 1233.591437][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1233.591437][T16946] get_compat_msghdr+0x108/0x2c0 [ 1233.591437][T16946] ? __sys_recvmmsg+0x51c/0x6f0 [ 1233.668705][T16946] do_recvmmsg+0x1063/0x2120 [ 1233.668705][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1233.668705][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1233.668705][T16946] ? kmsan_internal_check_memory+0x9a/0x560 [ 1233.668705][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1233.668705][T16946] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1233.668705][T16946] ? __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1233.668705][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1233.668705][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1233.668705][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1233.668705][T16946] do_fast_syscall_32+0x34/0x70 [ 1233.668705][T16946] do_SYSENTER_32+0x1b/0x20 [ 1233.668705][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1233.668705][T16946] RIP: 0023:0xf6eea549 [ 1233.668705][T16946] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 [ 1233.758565][T16946] RSP: 002b:00000000f5a605fc EFLAGS: 00000296 ORIG_RAX: 0000000000000151 [ 1233.758565][T16946] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000200000c0 [ 1233.758565][T16946] RDX: 0000000000010106 RSI: 0000000000000002 RDI: 0000000000000000 [ 1233.788531][T16946] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1233.788531][T16946] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1233.788531][T16946] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1233.788531][T16946] [ 1233.822453][T16946] Uninit was stored to memory at: [ 1233.827556][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1233.833323][T16946] get_compat_msghdr+0x108/0x2c0 [ 1233.838435][T16946] do_recvmmsg+0x1063/0x2120 [ 1233.843080][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1233.847814][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1233.854339][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1233.859521][T16946] do_fast_syscall_32+0x34/0x70 [ 1233.864419][T16946] do_SYSENTER_32+0x1b/0x20 [ 1233.869091][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1233.875476][T16946] [ 1233.877809][T16946] Uninit was stored to memory at: [ 1233.883018][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1233.888306][T16946] get_compat_msghdr+0x108/0x2c0 [ 1233.893295][T16946] do_recvmmsg+0x1063/0x2120 [ 1233.897923][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1233.902766][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1233.909276][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1233.914349][T16946] do_fast_syscall_32+0x34/0x70 [ 1233.919362][T16946] do_SYSENTER_32+0x1b/0x20 [ 1233.923913][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1233.930403][T16946] [ 1233.932740][T16946] Uninit was stored to memory at: [ 1233.937832][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1233.943118][T16946] get_compat_msghdr+0x108/0x2c0 [ 1233.948121][T16946] do_recvmmsg+0x1063/0x2120 [ 1233.952878][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1233.957600][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1233.964104][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1233.969292][T16946] do_fast_syscall_32+0x34/0x70 [ 1233.974188][T16946] do_SYSENTER_32+0x1b/0x20 [ 1233.978850][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1233.985235][T16946] [ 1233.987570][T16946] Uninit was stored to memory at: [ 1233.992780][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1233.997936][T16946] get_compat_msghdr+0x108/0x2c0 [ 1234.003042][T16946] do_recvmmsg+0x1063/0x2120 [ 1234.007666][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1234.012505][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1234.019080][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1234.024148][T16946] do_fast_syscall_32+0x34/0x70 [ 1234.029181][T16946] do_SYSENTER_32+0x1b/0x20 [ 1234.033734][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1234.040233][T16946] [ 1234.042563][T16946] Uninit was stored to memory at: [ 1234.047652][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1234.052922][T16946] get_compat_msghdr+0x108/0x2c0 [ 1234.057914][T16946] do_recvmmsg+0x1063/0x2120 [ 1234.062673][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1234.067389][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1234.073905][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1234.079095][T16946] do_fast_syscall_32+0x34/0x70 [ 1234.084079][T16946] do_SYSENTER_32+0x1b/0x20 [ 1234.088747][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1234.095125][T16946] [ 1234.097462][T16946] Uninit was stored to memory at: [ 1234.102675][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1234.107844][T16946] get_compat_msghdr+0x108/0x2c0 [ 1234.113047][T16946] do_recvmmsg+0x1063/0x2120 [ 1234.117678][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1234.122688][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1234.129187][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1234.134358][T16946] do_fast_syscall_32+0x34/0x70 [ 1234.139379][T16946] do_SYSENTER_32+0x1b/0x20 [ 1234.143942][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1234.150443][T16946] [ 1234.152791][T16946] Uninit was stored to memory at: [ 1234.157886][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1234.163166][T16946] get_compat_msghdr+0x108/0x2c0 [ 1234.168178][T16946] do_recvmmsg+0x1063/0x2120 [ 1234.172992][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1234.177721][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1234.184241][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1234.189430][T16946] do_fast_syscall_32+0x34/0x70 [ 1234.194332][T16946] do_SYSENTER_32+0x1b/0x20 [ 1234.198999][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1234.205386][T16946] [ 1234.207721][T16946] Local variable msg_sys created at: [ 1234.213144][T16946] do_recvmmsg+0xc1/0x2120 [ 1234.217604][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1234.232067][T13766] device veth1_macvtap left promiscuous mode [ 1234.238494][T13766] device veth0_macvtap left promiscuous mode [ 1234.244700][T13766] device veth1_vlan left promiscuous mode [ 1234.251292][T13766] device veth0_vlan left promiscuous mode [ 1234.551550][T16939] not chained 40000 origins [ 1234.556094][T16939] CPU: 1 PID: 16939 Comm: syz-executor.3 Not tainted 5.16.0-rc3-syzkaller #0 [ 1234.558263][T16939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1234.558263][T16939] Call Trace: [ 1234.558263][T16939] [ 1234.558263][T16939] dump_stack_lvl+0x1ff/0x28e [ 1234.558263][T16939] dump_stack+0x25/0x28 [ 1234.558263][T16939] kmsan_internal_chain_origin+0x7a/0x110 [ 1234.558263][T16939] ? kmsan_internal_unpoison_memory+0x10/0x20 [ 1234.558263][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1234.558263][T16939] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1234.558263][T16939] ? __unix_dgram_recvmsg+0x1a18/0x1c30 [ 1234.558263][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1234.558263][T16939] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1234.628603][T16939] ? should_fail+0x75/0x9c0 [ 1234.628603][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1234.635007][T16939] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1234.635007][T16939] ? kmsan_internal_unpoison_memory+0x10/0x20 [ 1234.635007][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1234.635007][T16939] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1234.658500][T16939] __msan_chain_origin+0xbf/0x140 [ 1234.658500][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1234.658500][T16939] get_compat_msghdr+0x108/0x2c0 [ 1234.658500][T16939] ? __sys_recvmmsg+0x51c/0x6f0 [ 1234.658500][T16939] do_recvmmsg+0x1063/0x2120 [ 1234.658500][T16939] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1234.688424][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1234.688424][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1234.688424][T16939] ? kmsan_internal_check_memory+0x9a/0x560 [ 1234.688424][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1234.688424][T16939] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1234.688424][T16939] ? __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1234.688424][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1234.688424][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1234.688424][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1234.688424][T16939] do_fast_syscall_32+0x34/0x70 [ 1234.688424][T16939] do_SYSENTER_32+0x1b/0x20 [ 1234.688424][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1234.688424][T16939] RIP: 0023:0xf6eea549 [ 1234.688424][T16939] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 [ 1234.688424][T16939] RSP: 002b:00000000f5ac35fc EFLAGS: 00000296 ORIG_RAX: 0000000000000151 [ 1234.688424][T16939] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000200000c0 [ 1234.688424][T16939] RDX: 0000000000010106 RSI: 0000000000000002 RDI: 0000000000000000 [ 1234.688424][T16939] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1234.688424][T16939] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1234.688424][T16939] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1234.688424][T16939] [ 1234.839088][T16939] Uninit was stored to memory at: [ 1234.844204][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1234.849759][T16939] get_compat_msghdr+0x108/0x2c0 [ 1234.854772][T16939] do_recvmmsg+0x1063/0x2120 [ 1234.859518][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1234.864235][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1234.870738][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1234.875812][T16939] do_fast_syscall_32+0x34/0x70 [ 1234.880829][T16939] do_SYSENTER_32+0x1b/0x20 [ 1234.885377][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1234.891874][T16939] [ 1234.894207][T16939] Uninit was stored to memory at: [ 1234.899413][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1234.904564][T16939] get_compat_msghdr+0x108/0x2c0 [ 1234.909733][T16939] do_recvmmsg+0x1063/0x2120 [ 1234.914449][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1234.919356][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1234.925751][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1234.931022][T16939] do_fast_syscall_32+0x34/0x70 [ 1234.935923][T16939] do_SYSENTER_32+0x1b/0x20 [ 1234.940667][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1234.947047][T16939] [ 1234.949573][T16939] Uninit was stored to memory at: [ 1234.954672][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1234.960017][T16939] get_compat_msghdr+0x108/0x2c0 [ 1234.965102][T16939] do_recvmmsg+0x1063/0x2120 [ 1234.969933][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1234.974655][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1234.981326][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1234.986416][T16939] do_fast_syscall_32+0x34/0x70 [ 1234.991501][T16939] do_SYSENTER_32+0x1b/0x20 [ 1234.996051][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1235.002608][T16939] [ 1235.004947][T16939] Uninit was stored to memory at: [ 1235.010272][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1235.015429][T16939] get_compat_msghdr+0x108/0x2c0 [ 1235.020605][T16939] do_recvmmsg+0x1063/0x2120 [ 1235.025233][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1235.030125][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1235.036510][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1235.041775][T16939] do_fast_syscall_32+0x34/0x70 [ 1235.046676][T16939] do_SYSENTER_32+0x1b/0x20 [ 1235.051410][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1235.057781][T16939] [ 1235.060305][T16939] Uninit was stored to memory at: [ 1235.065405][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1235.070831][T16939] get_compat_msghdr+0x108/0x2c0 [ 1235.075831][T16939] do_recvmmsg+0x1063/0x2120 [ 1235.080736][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1235.085454][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1235.092035][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1235.097141][T16939] do_fast_syscall_32+0x34/0x70 [ 1235.102313][T16939] do_SYSENTER_32+0x1b/0x20 [ 1235.106865][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1235.113611][T16939] [ 1235.115974][T16939] Uninit was stored to memory at: [ 1235.121269][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1235.126447][T16939] get_compat_msghdr+0x108/0x2c0 [ 1235.131621][T16939] do_recvmmsg+0x1063/0x2120 [ 1235.136339][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1235.141224][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1235.147609][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1235.152856][T16939] do_fast_syscall_32+0x34/0x70 [ 1235.157760][T16939] do_SYSENTER_32+0x1b/0x20 [ 1235.162506][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1235.169064][T16939] [ 1235.171489][T16939] Uninit was stored to memory at: [ 1235.176592][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1235.181938][T16939] get_compat_msghdr+0x108/0x2c0 [ 1235.186933][T16939] do_recvmmsg+0x1063/0x2120 [ 1235.191765][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1235.196486][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1235.203178][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1235.208544][T16939] do_fast_syscall_32+0x34/0x70 [ 1235.213454][T16939] do_SYSENTER_32+0x1b/0x20 [ 1235.218103][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1235.224764][T16939] [ 1235.227099][T16939] Local variable msg_sys created at: [ 1235.232577][T16939] do_recvmmsg+0xc1/0x2120 [ 1235.237032][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1235.882888][T16946] not chained 50000 origins [ 1235.887442][T16946] CPU: 1 PID: 16946 Comm: syz-executor.3 Not tainted 5.16.0-rc3-syzkaller #0 [ 1235.888242][T16946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1235.888242][T16946] Call Trace: [ 1235.888242][T16946] [ 1235.888242][T16946] dump_stack_lvl+0x1ff/0x28e [ 1235.888242][T16946] dump_stack+0x25/0x28 [ 1235.888242][T16946] kmsan_internal_chain_origin+0x7a/0x110 [ 1235.888242][T16946] ? kmsan_internal_unpoison_memory+0x10/0x20 [ 1235.888242][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1235.888242][T16946] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1235.939337][T16946] ? __unix_dgram_recvmsg+0x1a18/0x1c30 [ 1235.948524][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1235.953308][T16946] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1235.953308][T16946] ? should_fail+0x75/0x9c0 [ 1235.953308][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1235.953308][T16946] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1235.953308][T16946] ? kmsan_internal_unpoison_memory+0x10/0x20 [ 1235.953308][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1235.953308][T16946] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1235.953308][T16946] __msan_chain_origin+0xbf/0x140 [ 1235.953308][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1235.953308][T16946] get_compat_msghdr+0x108/0x2c0 [ 1235.953308][T16946] ? __sys_recvmmsg+0x51c/0x6f0 [ 1235.953308][T16946] do_recvmmsg+0x1063/0x2120 [ 1235.953308][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1235.953308][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1235.953308][T16946] ? kmsan_internal_check_memory+0x9a/0x560 [ 1235.953308][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1236.038517][T16946] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1236.038517][T16946] ? __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1236.038517][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1236.038517][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1236.038517][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1236.038517][T16946] do_fast_syscall_32+0x34/0x70 [ 1236.038517][T16946] do_SYSENTER_32+0x1b/0x20 [ 1236.038517][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1236.038517][T16946] RIP: 0023:0xf6eea549 [ 1236.038517][T16946] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 [ 1236.038517][T16946] RSP: 002b:00000000f5a605fc EFLAGS: 00000296 ORIG_RAX: 0000000000000151 [ 1236.038517][T16946] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000200000c0 [ 1236.038517][T16946] RDX: 0000000000010106 RSI: 0000000000000002 RDI: 0000000000000000 [ 1236.038517][T16946] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1236.038517][T16946] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1236.038517][T16946] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1236.038517][T16946] [ 1236.163504][T16946] Uninit was stored to memory at: [ 1236.168958][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1236.174155][T16946] get_compat_msghdr+0x108/0x2c0 [ 1236.179350][T16946] do_recvmmsg+0x1063/0x2120 [ 1236.183980][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1236.188804][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1236.195191][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1236.200380][T16946] do_fast_syscall_32+0x34/0x70 [ 1236.205275][T16946] do_SYSENTER_32+0x1b/0x20 [ 1236.209931][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1236.216316][T16946] [ 1236.218764][T16946] Uninit was stored to memory at: [ 1236.223851][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1236.229118][T16946] get_compat_msghdr+0x108/0x2c0 [ 1236.234100][T16946] do_recvmmsg+0x1063/0x2120 [ 1236.238835][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1236.243550][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1236.250072][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1236.255143][T16946] do_fast_syscall_32+0x34/0x70 [ 1236.260220][T16946] do_SYSENTER_32+0x1b/0x20 [ 1236.264769][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1236.271341][T16946] [ 1236.273738][T16946] Uninit was stored to memory at: [ 1236.278966][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1236.284130][T16946] get_compat_msghdr+0x108/0x2c0 [ 1236.289237][T16946] do_recvmmsg+0x1063/0x2120 [ 1236.293864][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1236.298700][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1236.305094][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1236.310354][T16946] do_fast_syscall_32+0x34/0x70 [ 1236.315262][T16946] do_SYSENTER_32+0x1b/0x20 [ 1236.320086][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1236.326471][T16946] [ 1236.328985][T16946] Uninit was stored to memory at: [ 1236.334082][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1236.339436][T16946] get_compat_msghdr+0x108/0x2c0 [ 1236.344429][T16946] do_recvmmsg+0x1063/0x2120 [ 1236.349235][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1236.353956][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1236.360549][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1236.365628][T16946] do_fast_syscall_32+0x34/0x70 [ 1236.370723][T16946] do_SYSENTER_32+0x1b/0x20 [ 1236.375281][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1236.381862][T16946] [ 1236.384201][T16946] Uninit was stored to memory at: [ 1236.389462][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1236.394623][T16946] get_compat_msghdr+0x108/0x2c0 [ 1236.399787][T16946] do_recvmmsg+0x1063/0x2120 [ 1236.404416][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1236.409323][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1236.415740][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1236.421025][T16946] do_fast_syscall_32+0x34/0x70 [ 1236.425928][T16946] do_SYSENTER_32+0x1b/0x20 [ 1236.430665][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1236.437052][T16946] [ 1236.439578][T16946] Uninit was stored to memory at: [ 1236.444679][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1236.450041][T16946] get_compat_msghdr+0x108/0x2c0 [ 1236.455034][T16946] do_recvmmsg+0x1063/0x2120 [ 1236.459833][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1236.464550][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1236.471131][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1236.476203][T16946] do_fast_syscall_32+0x34/0x70 [ 1236.481273][T16946] do_SYSENTER_32+0x1b/0x20 [ 1236.485818][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1236.492390][T16946] [ 1236.494726][T16946] Uninit was stored to memory at: [ 1236.499928][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1236.505090][T16946] get_compat_msghdr+0x108/0x2c0 [ 1236.510183][T16946] do_recvmmsg+0x1063/0x2120 [ 1236.514806][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1236.519632][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1236.526188][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1236.531389][T16946] do_fast_syscall_32+0x34/0x70 [ 1236.536289][T16946] do_SYSENTER_32+0x1b/0x20 [ 1236.540950][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1236.547327][T16946] [ 1236.549786][T16946] Local variable msg_sys created at: [ 1236.555080][T16946] do_recvmmsg+0xc1/0x2120 [ 1236.559661][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1237.044891][T16946] not chained 60000 origins [ 1237.049633][T16946] CPU: 1 PID: 16946 Comm: syz-executor.3 Not tainted 5.16.0-rc3-syzkaller #0 [ 1237.058445][T16946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1237.059484][T16946] Call Trace: [ 1237.059484][T16946] [ 1237.059484][T16946] dump_stack_lvl+0x1ff/0x28e [ 1237.059484][T16946] dump_stack+0x25/0x28 [ 1237.059484][T16946] kmsan_internal_chain_origin+0x7a/0x110 [ 1237.059484][T16946] ? kmsan_internal_unpoison_memory+0x10/0x20 [ 1237.093996][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1237.093996][T16946] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1237.093996][T16946] ? __unix_dgram_recvmsg+0x1a18/0x1c30 [ 1237.093996][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1237.093996][T16946] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1237.093996][T16946] ? should_fail+0x75/0x9c0 [ 1237.093996][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1237.093996][T16946] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1237.093996][T16946] ? kmsan_internal_unpoison_memory+0x10/0x20 [ 1237.093996][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1237.093996][T16946] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1237.093996][T16946] __msan_chain_origin+0xbf/0x140 [ 1237.093996][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1237.093996][T16946] get_compat_msghdr+0x108/0x2c0 [ 1237.093996][T16946] ? __sys_recvmmsg+0x51c/0x6f0 [ 1237.093996][T16946] do_recvmmsg+0x1063/0x2120 [ 1237.093996][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1237.093996][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1237.093996][T16946] ? kmsan_internal_check_memory+0x9a/0x560 [ 1237.093996][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1237.093996][T16946] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1237.093996][T16946] ? __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1237.093996][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1237.093996][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1237.093996][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1237.093996][T16946] do_fast_syscall_32+0x34/0x70 [ 1237.093996][T16946] do_SYSENTER_32+0x1b/0x20 [ 1237.093996][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1237.093996][T16946] RIP: 0023:0xf6eea549 [ 1237.093996][T16946] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 [ 1237.093996][T16946] RSP: 002b:00000000f5a605fc EFLAGS: 00000296 ORIG_RAX: 0000000000000151 [ 1237.093996][T16946] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000200000c0 [ 1237.093996][T16946] RDX: 0000000000010106 RSI: 0000000000000002 RDI: 0000000000000000 [ 1237.093996][T16946] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1237.093996][T16946] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1237.093996][T16946] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1237.093996][T16946] [ 1237.325361][T16946] Uninit was stored to memory at: [ 1237.330750][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1237.335926][T16946] get_compat_msghdr+0x108/0x2c0 [ 1237.341033][T16946] do_recvmmsg+0x1063/0x2120 [ 1237.345661][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1237.350477][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1237.356861][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1237.362033][T16946] do_fast_syscall_32+0x34/0x70 [ 1237.366932][T16946] do_SYSENTER_32+0x1b/0x20 [ 1237.371580][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1237.378056][T16946] [ 1237.380582][T16946] Uninit was stored to memory at: [ 1237.385697][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1237.391048][T16946] get_compat_msghdr+0x108/0x2c0 [ 1237.396039][T16946] do_recvmmsg+0x1063/0x2120 [ 1237.400868][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1237.405584][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1237.412161][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1237.417238][T16946] do_fast_syscall_32+0x34/0x70 [ 1237.422322][T16946] do_SYSENTER_32+0x1b/0x20 [ 1237.426865][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1237.433427][T16946] [ 1237.435757][T16946] Uninit was stored to memory at: [ 1237.441033][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1237.446194][T16946] get_compat_msghdr+0x108/0x2c0 [ 1237.451373][T16946] do_recvmmsg+0x1063/0x2120 [ 1237.456003][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1237.460908][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1237.467291][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1237.472555][T16946] do_fast_syscall_32+0x34/0x70 [ 1237.477458][T16946] do_SYSENTER_32+0x1b/0x20 [ 1237.482205][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1237.488783][T16946] [ 1237.491126][T16946] Uninit was stored to memory at: [ 1237.496223][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1237.501569][T16946] get_compat_msghdr+0x108/0x2c0 [ 1237.506576][T16946] do_recvmmsg+0x1063/0x2120 [ 1237.511429][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1237.516145][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1237.522736][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1237.527812][T16946] do_fast_syscall_32+0x34/0x70 [ 1237.532129][T16939] not chained 70000 origins [ 1237.532953][T16946] do_SYSENTER_32+0x1b/0x20 [ 1237.537261][T16939] CPU: 0 PID: 16939 Comm: syz-executor.3 Not tainted 5.16.0-rc3-syzkaller #0 [ 1237.541843][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1237.538259][T16939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1237.538259][T16939] Call Trace: [ 1237.538259][T16939] [ 1237.538259][T16939] dump_stack_lvl+0x1ff/0x28e [ 1237.538259][T16939] dump_stack+0x25/0x28 [ 1237.538259][T16939] kmsan_internal_chain_origin+0x7a/0x110 [ 1237.557088][T16946] [ 1237.557096][T16946] Uninit was stored to memory at: [ 1237.557169][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1237.538259][T16939] ? kmsan_internal_unpoison_memory+0x10/0x20 [ 1237.538259][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1237.570602][T16946] get_compat_msghdr+0x108/0x2c0 [ 1237.538259][T16939] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1237.578102][T16946] do_recvmmsg+0x1063/0x2120 [ 1237.538259][T16939] ? __unix_dgram_recvmsg+0x1a18/0x1c30 [ 1237.538259][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1237.588034][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1237.538259][T16939] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1237.538259][T16939] ? should_fail+0x75/0x9c0 [ 1237.595465][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1237.538259][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1237.538259][T16939] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1237.606795][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1237.538259][T16939] ? kmsan_internal_unpoison_memory+0x10/0x20 [ 1237.538259][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1237.616927][T16946] do_fast_syscall_32+0x34/0x70 [ 1237.538259][T16939] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1237.538259][T16939] __msan_chain_origin+0xbf/0x140 [ 1237.627393][T16946] do_SYSENTER_32+0x1b/0x20 [ 1237.538259][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1237.538259][T16939] get_compat_msghdr+0x108/0x2c0 [ 1237.638137][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1237.638249][T16939] ? __sys_recvmmsg+0x51c/0x6f0 [ 1237.648679][T16946] [ 1237.638249][T16939] do_recvmmsg+0x1063/0x2120 [ 1237.659567][T16946] Uninit was stored to memory at: [ 1237.638249][T16939] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1237.670950][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1237.638249][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1237.681943][T16946] get_compat_msghdr+0x108/0x2c0 [ 1237.638249][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1237.691875][T16946] do_recvmmsg+0x1063/0x2120 [ 1237.638249][T16939] ? kmsan_internal_check_memory+0x9a/0x560 [ 1237.702671][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1237.638249][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1237.712254][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1237.638249][T16939] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1237.723493][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1237.638249][T16939] ? __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1237.638249][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1237.730688][T16946] do_fast_syscall_32+0x34/0x70 [ 1237.638249][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1237.740460][T16946] do_SYSENTER_32+0x1b/0x20 [ 1237.638249][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1237.751785][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1237.638249][T16939] do_fast_syscall_32+0x34/0x70 [ 1237.761803][T16946] [ 1237.638249][T16939] do_SYSENTER_32+0x1b/0x20 [ 1237.771478][T16946] Uninit was stored to memory at: [ 1237.638249][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1237.782163][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1237.638249][T16939] RIP: 0023:0xf6eea549 [ 1237.793585][T16946] get_compat_msghdr+0x108/0x2c0 [ 1237.638249][T16939] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 [ 1237.638249][T16939] RSP: 002b:00000000f5ac35fc EFLAGS: 00000296 ORIG_RAX: 0000000000000151 [ 1237.638249][T16939] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000200000c0 [ 1237.804921][T16946] do_recvmmsg+0x1063/0x2120 [ 1237.638249][T16939] RDX: 0000000000010106 RSI: 0000000000000002 RDI: 0000000000000000 [ 1237.638249][T16939] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1237.638249][T16939] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1237.638249][T16939] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1237.638249][T16939] [ 1237.816164][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1237.823656][T16939] Uninit was stored to memory at: [ 1237.827402][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1237.832408][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1237.837023][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1237.843473][T16939] get_compat_msghdr+0x108/0x2c0 [ 1237.848399][T16946] do_fast_syscall_32+0x34/0x70 [ 1237.850732][T16939] do_recvmmsg+0x1063/0x2120 [ 1237.855220][T16946] do_SYSENTER_32+0x1b/0x20 [ 1237.860342][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1237.866655][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1237.871872][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1237.875908][T16946] [ 1237.875919][T16946] Local variable msg_sys created at: [ 1237.880946][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1237.900632][T16946] do_recvmmsg+0xc1/0x2120 [ 1237.909154][T16939] do_fast_syscall_32+0x34/0x70 [ 1237.917107][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1238.047114][T16939] do_SYSENTER_32+0x1b/0x20 [ 1238.051903][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1238.058510][T16939] [ 1238.060846][T16939] Uninit was stored to memory at: [ 1238.065945][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1238.071794][T16939] get_compat_msghdr+0x108/0x2c0 [ 1238.076780][T16939] do_recvmmsg+0x1063/0x2120 [ 1238.081632][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1238.086346][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1238.092965][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1238.098040][T16939] do_fast_syscall_32+0x34/0x70 [ 1238.103164][T16939] do_SYSENTER_32+0x1b/0x20 [ 1238.107713][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1238.114306][T16939] [ 1238.116638][T16939] Uninit was stored to memory at: [ 1238.121950][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1238.127113][T16939] get_compat_msghdr+0x108/0x2c0 [ 1238.132312][T16939] do_recvmmsg+0x1063/0x2120 [ 1238.136941][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1238.141870][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1238.148455][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1238.153526][T16939] do_fast_syscall_32+0x34/0x70 [ 1238.158634][T16939] do_SYSENTER_32+0x1b/0x20 [ 1238.163190][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1238.169799][T16939] [ 1238.172144][T16939] Uninit was stored to memory at: [ 1238.177240][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1238.182625][T16939] get_compat_msghdr+0x108/0x2c0 [ 1238.187611][T16939] do_recvmmsg+0x1063/0x2120 [ 1238.192526][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1238.197243][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1238.203855][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1238.209246][T16939] do_fast_syscall_32+0x34/0x70 [ 1238.214144][T16939] do_SYSENTER_32+0x1b/0x20 [ 1238.218899][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1238.225375][T16939] [ 1238.227710][T16939] Uninit was stored to memory at: [ 1238.233036][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1238.238400][T16939] get_compat_msghdr+0x108/0x2c0 [ 1238.243391][T16939] do_recvmmsg+0x1063/0x2120 [ 1238.248018][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1238.252949][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1238.259485][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1238.264556][T16939] do_fast_syscall_32+0x34/0x70 [ 1238.269661][T16939] do_SYSENTER_32+0x1b/0x20 [ 1238.274209][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1238.280808][T16939] [ 1238.283144][T16939] Uninit was stored to memory at: [ 1238.288430][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1238.293589][T16939] get_compat_msghdr+0x108/0x2c0 [ 1238.298896][T16939] do_recvmmsg+0x1063/0x2120 [ 1238.303619][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1238.308557][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1238.314944][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1238.320229][T16939] do_fast_syscall_32+0x34/0x70 [ 1238.325131][T16939] do_SYSENTER_32+0x1b/0x20 [ 1238.329906][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1238.336293][T16939] [ 1238.338838][T16939] Uninit was stored to memory at: [ 1238.343930][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1238.349313][T16939] get_compat_msghdr+0x108/0x2c0 [ 1238.354304][T16939] do_recvmmsg+0x1063/0x2120 [ 1238.359146][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1238.363863][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1238.370456][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1238.375532][T16939] do_fast_syscall_32+0x34/0x70 [ 1238.380631][T16939] do_SYSENTER_32+0x1b/0x20 [ 1238.385267][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1238.391878][T16939] [ 1238.394216][T16939] Local variable msg_sys created at: [ 1238.399727][T16939] do_recvmmsg+0xc1/0x2120 [ 1238.404181][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1238.980831][T13766] team0 (unregistering): Port device team_slave_1 removed [ 1239.057882][T13766] team0 (unregistering): Port device team_slave_0 removed [ 1239.120788][T13766] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1239.207845][T13766] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1239.350297][T16946] not chained 80000 origins [ 1239.354841][T16946] CPU: 0 PID: 16946 Comm: syz-executor.3 Not tainted 5.16.0-rc3-syzkaller #0 [ 1239.358256][T16946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1239.358256][T16946] Call Trace: [ 1239.358256][T16946] [ 1239.358256][T16946] dump_stack_lvl+0x1ff/0x28e [ 1239.358256][T16946] dump_stack+0x25/0x28 [ 1239.358256][T16946] kmsan_internal_chain_origin+0x7a/0x110 [ 1239.358256][T16946] ? kmsan_internal_unpoison_memory+0x10/0x20 [ 1239.358256][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1239.358256][T16946] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1239.358256][T16946] ? __unix_dgram_recvmsg+0x1a18/0x1c30 [ 1239.358256][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1239.358256][T16946] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1239.358256][T16946] ? should_fail+0x75/0x9c0 [ 1239.430823][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1239.430823][T16946] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1239.430823][T16946] ? kmsan_internal_unpoison_memory+0x10/0x20 [ 1239.430823][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1239.430823][T16946] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1239.430823][T16946] __msan_chain_origin+0xbf/0x140 [ 1239.430823][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1239.430823][T16946] get_compat_msghdr+0x108/0x2c0 [ 1239.430823][T16946] ? __sys_recvmmsg+0x51c/0x6f0 [ 1239.430823][T16946] do_recvmmsg+0x1063/0x2120 [ 1239.430823][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1239.430823][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1239.430823][T16946] ? kmsan_internal_check_memory+0x9a/0x560 [ 1239.430823][T16946] ? kmsan_get_metadata+0xa4/0x120 [ 1239.430823][T16946] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1239.430823][T16946] ? __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1239.430823][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1239.430823][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1239.430823][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1239.430823][T16946] do_fast_syscall_32+0x34/0x70 [ 1239.430823][T16946] do_SYSENTER_32+0x1b/0x20 [ 1239.430823][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1239.430823][T16946] RIP: 0023:0xf6eea549 [ 1239.430823][T16946] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 [ 1239.430823][T16946] RSP: 002b:00000000f5a605fc EFLAGS: 00000296 ORIG_RAX: 0000000000000151 [ 1239.430823][T16946] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000200000c0 [ 1239.430823][T16946] RDX: 0000000000010106 RSI: 0000000000000002 RDI: 0000000000000000 [ 1239.601430][T16939] not chained 90000 origins [ 1239.430823][T16946] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1239.430823][T16946] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1239.430823][T16946] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1239.430823][T16946] [ 1239.633193][T16939] CPU: 1 PID: 16939 Comm: syz-executor.3 Not tainted 5.16.0-rc3-syzkaller #0 [ 1239.636187][T16946] Uninit was stored to memory at: [ 1239.638222][T16939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1239.638222][T16939] Call Trace: [ 1239.638222][T16939] [ 1239.638222][T16939] dump_stack_lvl+0x1ff/0x28e [ 1239.638222][T16939] dump_stack+0x25/0x28 [ 1239.638222][T16939] kmsan_internal_chain_origin+0x7a/0x110 [ 1239.642203][T16939] ? kmsan_internal_unpoison_memory+0x10/0x20 [ 1239.642203][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1239.642203][T16939] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1239.647438][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1239.642203][T16939] ? __unix_dgram_recvmsg+0x1a18/0x1c30 [ 1239.642203][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1239.642203][T16939] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1239.661032][T16946] get_compat_msghdr+0x108/0x2c0 [ 1239.642203][T16939] ? should_fail+0x75/0x9c0 [ 1239.668639][T16946] do_recvmmsg+0x1063/0x2120 [ 1239.642203][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1239.678477][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1239.642203][T16939] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1239.689618][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1239.642203][T16939] ? kmsan_internal_unpoison_memory+0x10/0x20 [ 1239.700496][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1239.642203][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1239.711137][T16946] do_fast_syscall_32+0x34/0x70 [ 1239.642203][T16939] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1239.721991][T16946] do_SYSENTER_32+0x1b/0x20 [ 1239.642203][T16939] __msan_chain_origin+0xbf/0x140 [ 1239.731028][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1239.642203][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1239.740792][T16946] [ 1239.642203][T16939] get_compat_msghdr+0x108/0x2c0 [ 1239.753341][T16946] Uninit was stored to memory at: [ 1239.642203][T16939] ? __sys_recvmmsg+0x51c/0x6f0 [ 1239.642203][T16939] do_recvmmsg+0x1063/0x2120 [ 1239.642203][T16939] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1239.764475][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1239.642203][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1239.642203][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1239.642203][T16939] ? kmsan_internal_check_memory+0x9a/0x560 [ 1239.774465][T16946] get_compat_msghdr+0x108/0x2c0 [ 1239.642203][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1239.642203][T16939] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1239.642203][T16939] ? __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1239.784854][T16946] do_recvmmsg+0x1063/0x2120 [ 1239.642203][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1239.642203][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1239.796556][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1239.642203][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1239.642203][T16939] do_fast_syscall_32+0x34/0x70 [ 1239.642203][T16939] do_SYSENTER_32+0x1b/0x20 [ 1239.804168][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1239.642203][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1239.642203][T16939] RIP: 0023:0xf6eea549 [ 1239.642203][T16939] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 [ 1239.814122][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1239.642203][T16939] RSP: 002b:00000000f5ac35fc EFLAGS: 00000296 ORIG_RAX: 0000000000000151 [ 1239.642203][T16939] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000200000c0 [ 1239.642203][T16939] RDX: 0000000000010106 RSI: 0000000000000002 RDI: 0000000000000000 [ 1239.642203][T16939] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1239.823657][T16946] do_fast_syscall_32+0x34/0x70 [ 1239.642203][T16939] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1239.642203][T16939] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1239.642203][T16939] [ 1239.832477][T16939] Uninit was stored to memory at: [ 1239.835087][T16946] do_SYSENTER_32+0x1b/0x20 [ 1239.840563][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1239.845410][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1239.851434][T16939] get_compat_msghdr+0x108/0x2c0 [ 1239.856360][T16946] [ 1239.856370][T16946] Uninit was stored to memory at: [ 1239.856442][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1239.861590][T16939] do_recvmmsg+0x1063/0x2120 [ 1239.867823][T16946] get_compat_msghdr+0x108/0x2c0 [ 1239.874410][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1239.879096][T16946] do_recvmmsg+0x1063/0x2120 [ 1239.883749][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1239.890236][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1239.894883][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1239.900011][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1239.904829][T16939] do_fast_syscall_32+0x34/0x70 [ 1239.909425][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1239.915734][T16939] do_SYSENTER_32+0x1b/0x20 [ 1239.922153][T16946] do_fast_syscall_32+0x34/0x70 [ 1239.922203][T16946] do_SYSENTER_32+0x1b/0x20 [ 1239.922250][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1239.926315][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1239.946035][T16946] [ 1239.951110][T16939] [ 1239.951119][T16939] Uninit was stored to memory at: [ 1239.951192][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1239.959622][T16946] Uninit was stored to memory at: [ 1239.959692][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1239.967572][T16939] get_compat_msghdr+0x108/0x2c0 [ 1239.975657][T16946] get_compat_msghdr+0x108/0x2c0 [ 1239.983690][T16939] do_recvmmsg+0x1063/0x2120 [ 1239.988637][T16946] do_recvmmsg+0x1063/0x2120 [ 1239.996591][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1240.004662][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1240.007664][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1240.012781][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1240.017252][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1240.022468][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1240.028877][T16939] do_fast_syscall_32+0x34/0x70 [ 1240.033814][T16946] do_fast_syscall_32+0x34/0x70 [ 1240.036126][T16939] do_SYSENTER_32+0x1b/0x20 [ 1240.041242][T16946] do_SYSENTER_32+0x1b/0x20 [ 1240.046321][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1240.051009][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1240.055922][T16939] [ 1240.055930][T16939] Uninit was stored to memory at: [ 1240.060697][T16946] [ 1240.065322][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1240.071685][T16946] Uninit was stored to memory at: [ 1240.076330][T16939] get_compat_msghdr+0x108/0x2c0 [ 1240.081540][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1240.087784][T16939] do_recvmmsg+0x1063/0x2120 [ 1240.092734][T16946] get_compat_msghdr+0x108/0x2c0 [ 1240.097724][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1240.102318][T16946] do_recvmmsg+0x1063/0x2120 [ 1240.107135][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1240.111734][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1240.118030][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1240.124452][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1240.126759][T16939] do_fast_syscall_32+0x34/0x70 [ 1240.129186][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1240.134181][T16939] do_SYSENTER_32+0x1b/0x20 [ 1240.139384][T16946] do_fast_syscall_32+0x34/0x70 [ 1240.144381][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1240.149585][T16946] do_SYSENTER_32+0x1b/0x20 [ 1240.154492][T16939] [ 1240.154500][T16939] Uninit was stored to memory at: [ 1240.154574][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1240.159528][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1240.164093][T16939] get_compat_msghdr+0x108/0x2c0 [ 1240.168774][T16946] [ 1240.173420][T16939] do_recvmmsg+0x1063/0x2120 [ 1240.178077][T16946] Uninit was stored to memory at: [ 1240.178148][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1240.184480][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1240.190804][T16946] get_compat_msghdr+0x108/0x2c0 [ 1240.195819][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1240.200944][T16946] do_recvmmsg+0x1063/0x2120 [ 1240.205764][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1240.210706][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1240.215179][T16939] do_fast_syscall_32+0x34/0x70 [ 1240.219789][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1240.226090][T16939] do_SYSENTER_32+0x1b/0x20 [ 1240.232516][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1240.234825][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1240.239948][T16946] do_fast_syscall_32+0x34/0x70 [ 1240.242244][T16939] [ 1240.242253][T16939] Uninit was stored to memory at: [ 1240.247333][T16946] do_SYSENTER_32+0x1b/0x20 [ 1240.252508][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1240.257371][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1240.262573][T16939] get_compat_msghdr+0x108/0x2c0 [ 1240.267160][T16946] [ 1240.267169][T16946] Uninit was stored to memory at: [ 1240.272188][T16939] do_recvmmsg+0x1063/0x2120 [ 1240.276922][T16946] __get_compat_msghdr+0x6e1/0x9d0 [ 1240.281643][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1240.287963][T16946] get_compat_msghdr+0x108/0x2c0 [ 1240.292722][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1240.297740][T16946] do_recvmmsg+0x1063/0x2120 [ 1240.304169][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1240.309122][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1240.314118][T16939] do_fast_syscall_32+0x34/0x70 [ 1240.318713][T16946] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1240.323531][T16939] do_SYSENTER_32+0x1b/0x20 [ 1240.329956][T16946] __do_fast_syscall_32+0x96/0xf0 [ 1240.334429][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1240.336747][T16946] do_fast_syscall_32+0x34/0x70 [ 1240.341916][T16939] [ 1240.341926][T16939] Uninit was stored to memory at: [ 1240.342001][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1240.347025][T16946] do_SYSENTER_32+0x1b/0x20 [ 1240.353713][T16939] get_compat_msghdr+0x108/0x2c0 [ 1240.358745][T16946] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1240.361054][T16939] do_recvmmsg+0x1063/0x2120 [ 1240.365625][T16946] [ 1240.365634][T16946] Local variable msg_sys created at: [ 1240.370748][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1240.375848][T16946] do_recvmmsg+0xc1/0x2120 [ 1240.380610][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1240.385539][T16946] __sys_recvmmsg+0x51c/0x6f0 [ 1240.391955][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1240.613604][T16939] do_fast_syscall_32+0x34/0x70 [ 1240.618691][T16939] do_SYSENTER_32+0x1b/0x20 [ 1240.623249][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1240.629801][T16939] [ 1240.632139][T16939] Uninit was stored to memory at: [ 1240.637234][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1240.642562][T16939] get_compat_msghdr+0x108/0x2c0 [ 1240.647554][T16939] do_recvmmsg+0x1063/0x2120 [ 1240.652564][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1240.657280][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1240.663860][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1240.669122][T16939] do_fast_syscall_32+0x34/0x70 [ 1240.674029][T16939] do_SYSENTER_32+0x1b/0x20 [ 1240.678750][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1240.685130][T16939] [ 1240.687464][T16939] Local variable msg_sys created at: [ 1240.692951][T16939] do_recvmmsg+0xc1/0x2120 [ 1240.697409][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1241.008679][T13766] bond0 (unregistering): Released all slaves [ 1241.799323][T16939] not chained 100000 origins [ 1241.806249][T16939] CPU: 0 PID: 16939 Comm: syz-executor.3 Not tainted 5.16.0-rc3-syzkaller #0 [ 1241.809048][T16939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1241.809048][T16939] Call Trace: [ 1241.809048][T16939] [ 1241.809048][T16939] dump_stack_lvl+0x1ff/0x28e [ 1241.809048][T16939] dump_stack+0x25/0x28 [ 1241.809048][T16939] kmsan_internal_chain_origin+0x7a/0x110 [ 1241.809048][T16939] ? kmsan_internal_unpoison_memory+0x10/0x20 [ 1241.809048][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1241.809048][T16939] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1241.809048][T16939] ? __unix_dgram_recvmsg+0x1a18/0x1c30 [ 1241.809048][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1241.809048][T16939] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1241.809048][T16939] ? should_fail+0x75/0x9c0 [ 1241.809048][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1241.809048][T16939] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1241.809048][T16939] ? kmsan_internal_unpoison_memory+0x10/0x20 [ 1241.809048][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1241.809048][T16939] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1241.809048][T16939] __msan_chain_origin+0xbf/0x140 [ 1241.809048][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1241.809048][T16939] get_compat_msghdr+0x108/0x2c0 [ 1241.809048][T16939] ? __sys_recvmmsg+0x51c/0x6f0 [ 1241.809048][T16939] do_recvmmsg+0x1063/0x2120 [ 1241.809048][T16939] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1241.809048][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1241.809048][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1241.809048][T16939] ? kmsan_internal_check_memory+0x9a/0x560 [ 1241.809048][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1241.965713][T16939] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1241.965713][T16939] ? __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1241.965713][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1241.965713][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1241.965713][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1241.965713][T16939] do_fast_syscall_32+0x34/0x70 [ 1241.965713][T16939] do_SYSENTER_32+0x1b/0x20 [ 1241.965713][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1241.965713][T16939] RIP: 0023:0xf6eea549 [ 1242.013666][T16939] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 [ 1242.013666][T16939] RSP: 002b:00000000f5ac35fc EFLAGS: 00000296 ORIG_RAX: 0000000000000151 [ 1242.013666][T16939] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000200000c0 [ 1242.013666][T16939] RDX: 0000000000010106 RSI: 0000000000000002 RDI: 0000000000000000 [ 1242.013666][T16939] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1242.013666][T16939] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1242.013666][T16939] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1242.013666][T16939] [ 1242.103713][T16939] Uninit was stored to memory at: [ 1242.119254][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1242.124434][T16939] get_compat_msghdr+0x108/0x2c0 [ 1242.129817][T16939] do_recvmmsg+0x1063/0x2120 [ 1242.134458][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1242.139329][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1242.145723][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1242.151003][T16939] do_fast_syscall_32+0x34/0x70 [ 1242.155904][T16939] do_SYSENTER_32+0x1b/0x20 [ 1242.160676][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1242.167060][T16939] [ 1242.169613][T16939] Uninit was stored to memory at: [ 1242.174709][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1242.180081][T16939] get_compat_msghdr+0x108/0x2c0 [ 1242.185155][T16939] do_recvmmsg+0x1063/0x2120 [ 1242.190000][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1242.194722][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1242.201439][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1242.206949][T16939] do_fast_syscall_32+0x34/0x70 [ 1242.212055][T16939] do_SYSENTER_32+0x1b/0x20 [ 1242.216608][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1242.223570][T16939] [ 1242.225906][T16939] Uninit was stored to memory at: [ 1242.231197][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1242.236361][T16939] get_compat_msghdr+0x108/0x2c0 [ 1242.241574][T16939] do_recvmmsg+0x1063/0x2120 [ 1242.246205][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1242.251134][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1242.257518][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1242.262820][T16939] do_fast_syscall_32+0x34/0x70 [ 1242.267733][T16939] do_SYSENTER_32+0x1b/0x20 [ 1242.272498][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1242.279084][T16939] [ 1242.281422][T16939] Uninit was stored to memory at: [ 1242.286517][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1242.291928][T16939] get_compat_msghdr+0x108/0x2c0 [ 1242.296922][T16939] do_recvmmsg+0x1063/0x2120 [ 1242.302566][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1242.307285][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1242.313952][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1242.319227][T16939] do_fast_syscall_32+0x34/0x70 [ 1242.324125][T16939] do_SYSENTER_32+0x1b/0x20 [ 1242.328836][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1242.335221][T16939] [ 1242.337557][T16939] Uninit was stored to memory at: [ 1242.342884][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1242.348047][T16939] get_compat_msghdr+0x108/0x2c0 [ 1242.353254][T16939] do_recvmmsg+0x1063/0x2120 [ 1242.358635][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1242.363359][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1242.369974][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1242.375068][T16939] do_fast_syscall_32+0x34/0x70 [ 1242.380179][T16939] do_SYSENTER_32+0x1b/0x20 [ 1242.384745][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1242.391340][T16939] [ 1242.393680][T16939] Uninit was stored to memory at: [ 1242.398924][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1242.404083][T16939] get_compat_msghdr+0x108/0x2c0 [ 1242.409289][T16939] do_recvmmsg+0x1063/0x2120 [ 1242.413926][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1242.418959][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1242.425348][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1242.430655][T16939] do_fast_syscall_32+0x34/0x70 [ 1242.435553][T16939] do_SYSENTER_32+0x1b/0x20 [ 1242.440328][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1242.446746][T16939] [ 1242.449347][T16939] Uninit was stored to memory at: [ 1242.454453][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1242.459817][T16939] get_compat_msghdr+0x108/0x2c0 [ 1242.464808][T16939] do_recvmmsg+0x1063/0x2120 [ 1242.469641][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1242.474357][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1242.481071][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1242.486148][T16939] do_fast_syscall_32+0x34/0x70 [ 1242.491271][T16939] do_SYSENTER_32+0x1b/0x20 [ 1242.495818][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1242.502434][T16939] [ 1242.504769][T16939] Local variable msg_sys created at: [ 1242.510294][T16939] do_recvmmsg+0xc1/0x2120 [ 1242.514749][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1243.107992][T16939] not chained 110000 origins [ 1243.113145][T16939] CPU: 0 PID: 16939 Comm: syz-executor.3 Not tainted 5.16.0-rc3-syzkaller #0 [ 1243.121954][T16939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1243.122705][T16939] Call Trace: [ 1243.133959][T16939] [ 1243.133959][T16939] dump_stack_lvl+0x1ff/0x28e [ 1243.133959][T16939] dump_stack+0x25/0x28 [ 1243.133959][T16939] kmsan_internal_chain_origin+0x7a/0x110 [ 1243.133959][T16939] ? kmsan_internal_unpoison_memory+0x10/0x20 [ 1243.133959][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1243.133959][T16939] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1243.133959][T16939] ? __unix_dgram_recvmsg+0x1a18/0x1c30 [ 1243.133959][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1243.133959][T16939] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1243.133959][T16939] ? should_fail+0x75/0x9c0 [ 1243.133959][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1243.133959][T16939] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1243.133959][T16939] ? kmsan_internal_unpoison_memory+0x10/0x20 [ 1243.133959][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1243.133959][T16939] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1243.133959][T16939] __msan_chain_origin+0xbf/0x140 [ 1243.133959][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1243.133959][T16939] get_compat_msghdr+0x108/0x2c0 [ 1243.133959][T16939] ? __sys_recvmmsg+0x51c/0x6f0 [ 1243.133959][T16939] do_recvmmsg+0x1063/0x2120 [ 1243.133959][T16939] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1243.133959][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1243.133959][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1243.133959][T16939] ? kmsan_internal_check_memory+0x9a/0x560 [ 1243.133959][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1243.133959][T16939] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1243.133959][T16939] ? __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1243.133959][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1243.133959][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1243.133959][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1243.133959][T16939] do_fast_syscall_32+0x34/0x70 [ 1243.133959][T16939] do_SYSENTER_32+0x1b/0x20 [ 1243.133959][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1243.133959][T16939] RIP: 0023:0xf6eea549 [ 1243.133959][T16939] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 [ 1243.133959][T16939] RSP: 002b:00000000f5ac35fc EFLAGS: 00000296 ORIG_RAX: 0000000000000151 [ 1243.133959][T16939] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000200000c0 [ 1243.133959][T16939] RDX: 0000000000010106 RSI: 0000000000000002 RDI: 0000000000000000 [ 1243.133959][T16939] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1243.133959][T16939] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1243.133959][T16939] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1243.133959][T16939] [ 1243.396024][T16939] Uninit was stored to memory at: [ 1243.402087][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1243.407251][T16939] get_compat_msghdr+0x108/0x2c0 [ 1243.412381][T16939] do_recvmmsg+0x1063/0x2120 [ 1243.417009][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1243.421878][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1243.428396][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1243.433466][T16939] do_fast_syscall_32+0x34/0x70 [ 1243.438612][T16939] do_SYSENTER_32+0x1b/0x20 [ 1243.443193][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1243.449727][T16939] [ 1243.452065][T16939] Uninit was stored to memory at: [ 1243.457165][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1243.462574][T16939] get_compat_msghdr+0x108/0x2c0 [ 1243.467572][T16939] do_recvmmsg+0x1063/0x2120 [ 1243.472430][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1243.477156][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1243.483789][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1243.489072][T16939] do_fast_syscall_32+0x34/0x70 [ 1243.493988][T16939] do_SYSENTER_32+0x1b/0x20 [ 1243.498783][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1243.505179][T16939] [ 1243.507521][T16939] Uninit was stored to memory at: [ 1243.512837][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1243.517996][T16939] get_compat_msghdr+0x108/0x2c0 [ 1243.523210][T16939] do_recvmmsg+0x1063/0x2120 [ 1243.527842][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1243.532767][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1243.539361][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1243.544433][T16939] do_fast_syscall_32+0x34/0x70 [ 1243.549543][T16939] do_SYSENTER_32+0x1b/0x20 [ 1243.554094][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1243.560866][T16939] [ 1243.563274][T16939] Uninit was stored to memory at: [ 1243.568596][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1243.573852][T16939] get_compat_msghdr+0x108/0x2c0 [ 1243.579177][T16939] do_recvmmsg+0x1063/0x2120 [ 1243.583988][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1243.588938][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1243.595350][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1243.600649][T16939] do_fast_syscall_32+0x34/0x70 [ 1243.605551][T16939] do_SYSENTER_32+0x1b/0x20 [ 1243.610361][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1243.616765][T16939] [ 1243.619377][T16939] Uninit was stored to memory at: [ 1243.624477][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1243.629844][T16939] get_compat_msghdr+0x108/0x2c0 [ 1243.634836][T16939] do_recvmmsg+0x1063/0x2120 [ 1243.639682][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1243.644396][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1243.651021][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1243.656095][T16939] do_fast_syscall_32+0x34/0x70 [ 1243.661172][T16939] do_SYSENTER_32+0x1b/0x20 [ 1243.665752][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1243.672298][T16939] [ 1243.674634][T16939] Uninit was stored to memory at: [ 1243.679871][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1243.685037][T16939] get_compat_msghdr+0x108/0x2c0 [ 1243.690165][T16939] do_recvmmsg+0x1063/0x2120 [ 1243.694791][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1243.699638][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1243.706031][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1243.711248][T16939] do_fast_syscall_32+0x34/0x70 [ 1243.716142][T16939] do_SYSENTER_32+0x1b/0x20 [ 1243.720836][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1243.727218][T16939] [ 1243.729696][T16939] Uninit was stored to memory at: [ 1243.734970][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1243.740274][T16939] get_compat_msghdr+0x108/0x2c0 [ 1243.745257][T16939] do_recvmmsg+0x1063/0x2120 [ 1243.750037][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1243.754754][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1243.761329][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1243.766422][T16939] do_fast_syscall_32+0x34/0x70 [ 1243.771583][T16939] do_SYSENTER_32+0x1b/0x20 [ 1243.776137][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1243.782683][T16939] [ 1243.785026][T16939] Local variable msg_sys created at: [ 1243.790473][T16939] do_recvmmsg+0xc1/0x2120 [ 1243.794932][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1243.905193][T16939] not chained 120000 origins [ 1243.910170][T16939] CPU: 0 PID: 16939 Comm: syz-executor.3 Not tainted 5.16.0-rc3-syzkaller #0 [ 1243.918983][T16939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1243.920005][T16939] Call Trace: [ 1243.920005][T16939] [ 1243.920005][T16939] dump_stack_lvl+0x1ff/0x28e [ 1243.920005][T16939] dump_stack+0x25/0x28 [ 1243.920005][T16939] kmsan_internal_chain_origin+0x7a/0x110 [ 1243.920005][T16939] ? kmsan_internal_unpoison_memory+0x10/0x20 [ 1243.920005][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1243.920005][T16939] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1243.920005][T16939] ? __unix_dgram_recvmsg+0x1a18/0x1c30 [ 1243.920005][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1243.920005][T16939] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1243.920005][T16939] ? should_fail+0x75/0x9c0 [ 1243.920005][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1243.920005][T16939] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1243.920005][T16939] ? kmsan_internal_unpoison_memory+0x10/0x20 [ 1243.920005][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1243.920005][T16939] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1243.920005][T16939] __msan_chain_origin+0xbf/0x140 [ 1243.920005][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1243.920005][T16939] get_compat_msghdr+0x108/0x2c0 [ 1243.920005][T16939] ? __sys_recvmmsg+0x51c/0x6f0 [ 1243.920005][T16939] do_recvmmsg+0x1063/0x2120 [ 1243.920005][T16939] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1243.920005][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1243.920005][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1243.920005][T16939] ? kmsan_internal_check_memory+0x9a/0x560 [ 1243.920005][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1243.920005][T16939] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1243.920005][T16939] ? __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1243.920005][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1243.920005][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1243.920005][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1243.920005][T16939] do_fast_syscall_32+0x34/0x70 [ 1243.920005][T16939] do_SYSENTER_32+0x1b/0x20 [ 1243.920005][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1243.920005][T16939] RIP: 0023:0xf6eea549 [ 1243.920005][T16939] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 [ 1243.920005][T16939] RSP: 002b:00000000f5ac35fc EFLAGS: 00000296 ORIG_RAX: 0000000000000151 [ 1243.920005][T16939] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000200000c0 [ 1243.920005][T16939] RDX: 0000000000010106 RSI: 0000000000000002 RDI: 0000000000000000 [ 1243.920005][T16939] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1243.920005][T16939] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1243.920005][T16939] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1243.920005][T16939] [ 1244.193635][T16939] Uninit was stored to memory at: [ 1244.199139][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1244.204301][T16939] get_compat_msghdr+0x108/0x2c0 [ 1244.209451][T16939] do_recvmmsg+0x1063/0x2120 [ 1244.214083][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1244.218951][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1244.225341][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1244.230656][T16939] do_fast_syscall_32+0x34/0x70 [ 1244.235643][T16939] do_SYSENTER_32+0x1b/0x20 [ 1244.240344][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1244.246820][T16939] [ 1244.249308][T16939] Uninit was stored to memory at: [ 1244.254404][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1244.259709][T16939] get_compat_msghdr+0x108/0x2c0 [ 1244.264697][T16939] do_recvmmsg+0x1063/0x2120 [ 1244.269482][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1244.274195][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1244.280715][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1244.285783][T16939] do_fast_syscall_32+0x34/0x70 [ 1244.290835][T16939] do_SYSENTER_32+0x1b/0x20 [ 1244.295383][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1244.301920][T16939] [ 1244.304257][T16939] Uninit was stored to memory at: [ 1244.309494][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1244.314826][T16939] get_compat_msghdr+0x108/0x2c0 [ 1244.319962][T16939] do_recvmmsg+0x1063/0x2120 [ 1244.325026][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1244.329872][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1244.336258][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1244.341487][T16939] do_fast_syscall_32+0x34/0x70 [ 1244.346557][T16939] do_SYSENTER_32+0x1b/0x20 [ 1244.351268][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1244.357646][T16939] [ 1244.360128][T16939] Uninit was stored to memory at: [ 1244.365224][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1244.370545][T16939] get_compat_msghdr+0x108/0x2c0 [ 1244.375538][T16939] do_recvmmsg+0x1063/0x2120 [ 1244.380304][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1244.385021][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1244.391581][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1244.396675][T16939] do_fast_syscall_32+0x34/0x70 [ 1244.401739][T16939] do_SYSENTER_32+0x1b/0x20 [ 1244.406296][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1244.412884][T16939] [ 1244.415217][T16939] Uninit was stored to memory at: [ 1244.420530][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1244.425690][T16939] get_compat_msghdr+0x108/0x2c0 [ 1244.430903][T16939] do_recvmmsg+0x1063/0x2120 [ 1244.435538][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1244.440477][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1244.446864][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1244.452158][T16939] do_fast_syscall_32+0x34/0x70 [ 1244.457053][T16939] do_SYSENTER_32+0x1b/0x20 [ 1244.461821][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1244.468407][T16939] [ 1244.470747][T16939] Uninit was stored to memory at: [ 1244.475836][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1244.481218][T16939] get_compat_msghdr+0x108/0x2c0 [ 1244.486211][T16939] do_recvmmsg+0x1063/0x2120 [ 1244.491057][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1244.495776][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1244.502383][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1244.507459][T16939] do_fast_syscall_32+0x34/0x70 [ 1244.512927][T16939] do_SYSENTER_32+0x1b/0x20 [ 1244.517473][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1244.524074][T16939] [ 1244.526407][T16939] Uninit was stored to memory at: [ 1244.531706][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1244.536858][T16939] get_compat_msghdr+0x108/0x2c0 [ 1244.542065][T16939] do_recvmmsg+0x1063/0x2120 [ 1244.546693][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1244.551623][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1244.558013][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1244.563299][T16939] do_fast_syscall_32+0x34/0x70 [ 1244.568389][T16939] do_SYSENTER_32+0x1b/0x20 [ 1244.573034][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1244.579632][T16939] [ 1244.581967][T16939] Local variable msg_sys created at: [ 1244.587272][T16939] do_recvmmsg+0xc1/0x2120 [ 1244.591958][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1244.638523][T14361] Bluetooth: hci4: command 0x0409 tx timeout [ 1244.938641][T16977] chnl_net:caif_netlink_parms(): no params data found [ 1245.017388][T16939] not chained 130000 origins [ 1245.022307][T16939] CPU: 1 PID: 16939 Comm: syz-executor.3 Not tainted 5.16.0-rc3-syzkaller #0 [ 1245.031112][T16939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1245.032074][T16939] Call Trace: [ 1245.032074][T16939] [ 1245.032074][T16939] dump_stack_lvl+0x1ff/0x28e [ 1245.048363][T16939] dump_stack+0x25/0x28 [ 1245.048363][T16939] kmsan_internal_chain_origin+0x7a/0x110 [ 1245.048363][T16939] ? kmsan_internal_unpoison_memory+0x10/0x20 [ 1245.048363][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1245.048363][T16939] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1245.048363][T16939] ? __unix_dgram_recvmsg+0x1a18/0x1c30 [ 1245.048363][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1245.048363][T16939] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1245.048363][T16939] ? should_fail+0x75/0x9c0 [ 1245.048363][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1245.048363][T16939] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1245.048363][T16939] ? kmsan_internal_unpoison_memory+0x10/0x20 [ 1245.048363][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1245.048363][T16939] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1245.048363][T16939] __msan_chain_origin+0xbf/0x140 [ 1245.048363][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1245.048363][T16939] get_compat_msghdr+0x108/0x2c0 [ 1245.048363][T16939] ? __sys_recvmmsg+0x51c/0x6f0 [ 1245.048363][T16939] do_recvmmsg+0x1063/0x2120 [ 1245.048363][T16939] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1245.048363][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1245.048363][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1245.048363][T16939] ? kmsan_internal_check_memory+0x9a/0x560 [ 1245.048363][T16939] ? kmsan_get_metadata+0xa4/0x120 [ 1245.048363][T16939] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1245.048363][T16939] ? __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1245.048363][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1245.048363][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1245.048363][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1245.048363][T16939] do_fast_syscall_32+0x34/0x70 [ 1245.048363][T16939] do_SYSENTER_32+0x1b/0x20 [ 1245.048363][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1245.048363][T16939] RIP: 0023:0xf6eea549 [ 1245.048363][T16939] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 [ 1245.048363][T16939] RSP: 002b:00000000f5ac35fc EFLAGS: 00000296 ORIG_RAX: 0000000000000151 [ 1245.048363][T16939] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000200000c0 [ 1245.048363][T16939] RDX: 0000000000010106 RSI: 0000000000000002 RDI: 0000000000000000 [ 1245.048363][T16939] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1245.048363][T16939] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1245.048363][T16939] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1245.048363][T16939] [ 1245.305956][T16939] Uninit was stored to memory at: [ 1245.311380][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1245.316547][T16939] get_compat_msghdr+0x108/0x2c0 [ 1245.321657][T16939] do_recvmmsg+0x1063/0x2120 [ 1245.326281][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1245.331104][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1245.337492][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1245.342687][T16939] do_fast_syscall_32+0x34/0x70 [ 1245.347668][T16939] do_SYSENTER_32+0x1b/0x20 [ 1245.352683][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1245.359172][T16939] [ 1245.361506][T16939] Uninit was stored to memory at: [ 1245.366595][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1245.371954][T16939] get_compat_msghdr+0x108/0x2c0 [ 1245.376938][T16939] do_recvmmsg+0x1063/0x2120 [ 1245.381822][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1245.386569][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1245.393091][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1245.398415][T16939] do_fast_syscall_32+0x34/0x70 [ 1245.403318][T16939] do_SYSENTER_32+0x1b/0x20 [ 1245.407862][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1245.414410][T16939] [ 1245.416748][T16939] Uninit was stored to memory at: [ 1245.422031][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1245.427187][T16939] get_compat_msghdr+0x108/0x2c0 [ 1245.432348][T16939] do_recvmmsg+0x1063/0x2120 [ 1245.436980][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1245.441895][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1245.448471][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1245.453543][T16939] do_fast_syscall_32+0x34/0x70 [ 1245.458620][T16939] do_SYSENTER_32+0x1b/0x20 [ 1245.463172][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1245.469748][T16939] [ 1245.472081][T16939] Uninit was stored to memory at: [ 1245.477180][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1245.482531][T16939] get_compat_msghdr+0x108/0x2c0 [ 1245.487521][T16939] do_recvmmsg+0x1063/0x2120 [ 1245.492332][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1245.497050][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1245.503894][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1245.509135][T16939] do_fast_syscall_32+0x34/0x70 [ 1245.514035][T16939] do_SYSENTER_32+0x1b/0x20 [ 1245.518750][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1245.525127][T16939] [ 1245.527459][T16939] Uninit was stored to memory at: [ 1245.532739][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1245.537899][T16939] get_compat_msghdr+0x108/0x2c0 [ 1245.543322][T16939] do_recvmmsg+0x1063/0x2120 [ 1245.548090][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1245.552979][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1245.559489][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1245.564567][T16939] do_fast_syscall_32+0x34/0x70 [ 1245.569713][T16939] do_SYSENTER_32+0x1b/0x20 [ 1245.574262][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1245.580840][T16939] [ 1245.583194][T16939] Uninit was stored to memory at: [ 1245.588478][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1245.593634][T16939] get_compat_msghdr+0x108/0x2c0 [ 1245.598816][T16939] do_recvmmsg+0x1063/0x2120 [ 1245.603464][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1245.608177][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1245.614780][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1245.620040][T16939] do_fast_syscall_32+0x34/0x70 [ 1245.624954][T16939] do_SYSENTER_32+0x1b/0x20 [ 1245.629699][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1245.636086][T16939] [ 1245.638536][T16939] Uninit was stored to memory at: [ 1245.643634][T16939] __get_compat_msghdr+0x6e1/0x9d0 [ 1245.648965][T16939] get_compat_msghdr+0x108/0x2c0 [ 1245.653950][T16939] do_recvmmsg+0x1063/0x2120 [ 1245.658740][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1245.663459][T16939] __ia32_compat_sys_recvmmsg_time32+0x16e/0x1d0 [ 1245.670036][T16939] __do_fast_syscall_32+0x96/0xf0 [ 1245.675461][T16939] do_fast_syscall_32+0x34/0x70 [ 1245.680544][T16939] do_SYSENTER_32+0x1b/0x20 [ 1245.685180][T16939] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1245.691761][T16939] [ 1245.694092][T16939] Local variable msg_sys created at: [ 1245.699577][T16939] do_recvmmsg+0xc1/0x2120 [ 1245.704202][T16939] __sys_recvmmsg+0x51c/0x6f0 [ 1246.119454][T16977] bridge0: port 1(bridge_slave_0) entered blocking state [ 1246.126882][T16977] bridge0: port 1(bridge_slave_0) entered disabled state [ 1246.153242][T16977] device bridge_slave_0 entered promiscuous mode [ 1246.187962][T16977] bridge0: port 2(bridge_slave_1) entered blocking state [ 1246.195701][T16977] bridge0: port 2(bridge_slave_1) entered disabled state [ 1246.208302][T16977] device bridge_slave_1 entered promiscuous mode [ 1246.386544][T16977] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1246.434956][T16977] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1246.520703][T16977] team0: Port device team_slave_0 added [ 1246.538542][T16977] team0: Port device team_slave_1 added [ 1246.618029][T16977] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1246.626082][T16977] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1246.652307][T16977] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1246.676129][T16977] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1246.683922][T16977] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1246.710607][T16977] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1246.725350][T14361] Bluetooth: hci4: command 0x041b tx timeout [ 1246.837346][T16977] device hsr_slave_0 entered promiscuous mode [ 1246.847616][T16977] device hsr_slave_1 entered promiscuous mode [ 1246.856695][T16977] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1246.865678][T16977] Cannot create hsr debugfs directory [ 1247.404439][T16977] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1247.442832][T14361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1247.452749][T14361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1247.477120][T16977] 8021q: adding VLAN 0 to HW filter on device team0 [ 1247.501966][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1247.513123][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1247.523320][T11928] bridge0: port 1(bridge_slave_0) entered blocking state [ 1247.530921][T11928] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1247.544451][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1247.565734][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1247.577023][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1247.587440][T11928] bridge0: port 2(bridge_slave_1) entered blocking state [ 1247.595364][T11928] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1247.626957][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1247.660374][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1247.683703][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1247.699401][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1247.713876][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1247.743720][T12725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1247.755187][T12725] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1247.777411][T12725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1247.788030][T12725] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1247.812201][T12725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1247.822149][T12725] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1247.854965][T16977] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1247.865646][T11928] ===================================================== [ 1247.872246][T11928] BUG: KMSAN: uninit-value in __ipv6_dev_mc_inc+0x657/0x1680 [ 1247.872246][T11928] __ipv6_dev_mc_inc+0x657/0x1680 [ 1247.872246][T11928] ipv6_dev_mc_inc+0x70/0x80 [ 1247.872246][T11928] addrconf_dad_work+0x736/0x2230 [ 1247.872246][T11928] process_one_work+0xdc2/0x1820 [ 1247.872246][T11928] worker_thread+0x10f1/0x2290 [ 1247.872246][T11928] kthread+0x721/0x850 [ 1247.872246][T11928] ret_from_fork+0x1f/0x30 [ 1247.872246][T11928] [ 1247.872246][T11928] Local variable maddr.i.i created at: [ 1247.918036][T11928] addrconf_dad_work+0x32c/0x2230 [ 1247.918036][T11928] process_one_work+0xdc2/0x1820 [ 1247.918036][T11928] [ 1247.918036][T11928] CPU: 0 PID: 11928 Comm: kworker/0:1 Not tainted 5.16.0-rc3-syzkaller #0 [ 1247.918036][T11928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1247.918036][T11928] Workqueue: ipv6_addrconf addrconf_dad_work [ 1247.918036][T11928] ===================================================== [ 1247.918036][T11928] Disabling lock debugging due to kernel taint [ 1247.974601][T11928] Kernel panic - not syncing: kmsan.panic set ... [ 1247.981044][T11928] CPU: 0 PID: 11928 Comm: kworker/0:1 Tainted: G B 5.16.0-rc3-syzkaller #0 [ 1247.981308][T11928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1247.981308][T11928] Workqueue: ipv6_addrconf addrconf_dad_work [ 1247.981308][T11928] Call Trace: [ 1247.981308][T11928] [ 1247.981308][T11928] dump_stack_lvl+0x1ff/0x28e [ 1247.981308][T11928] dump_stack+0x25/0x28 [ 1247.981308][T11928] panic+0x467/0xe03 [ 1247.981308][T11928] ? add_taint+0x187/0x210 [ 1247.981308][T11928] ? _raw_spin_unlock_irqrestore+0x78/0xb0 [ 1248.036668][T11928] kmsan_report+0x306/0x310 [ 1248.036860][T11928] ? __msan_warning+0xb8/0x130 [ 1248.036860][T11928] ? __ipv6_dev_mc_inc+0x657/0x1680 [ 1248.050253][T11928] ? ipv6_dev_mc_inc+0x70/0x80 [ 1248.050253][T11928] ? addrconf_dad_work+0x736/0x2230 [ 1248.050253][T11928] ? process_one_work+0xdc2/0x1820 [ 1248.050253][T11928] ? worker_thread+0x10f1/0x2290 [ 1248.050253][T11928] ? kthread+0x721/0x850 [ 1248.050253][T11928] ? ret_from_fork+0x1f/0x30 [ 1248.050253][T11928] ? kmsan_get_metadata+0xa4/0x120 [ 1248.050253][T11928] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1248.050253][T11928] ? __rcu_read_unlock+0x82/0xf0 [ 1248.050253][T11928] ? ndisc_send_skb+0x104a/0x1740 [ 1248.050253][T11928] ? kmsan_get_metadata+0xa4/0x120 [ 1248.050253][T11928] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 1248.050253][T11928] ? kmsan_internal_unpoison_memory+0x10/0x20 [ 1248.050253][T11928] ? kmsan_get_metadata+0xa4/0x120 [ 1248.050253][T11928] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1248.050253][T11928] __msan_warning+0xb8/0x130 [ 1248.050253][T11928] __ipv6_dev_mc_inc+0x657/0x1680 [ 1248.050253][T11928] ipv6_dev_mc_inc+0x70/0x80 [ 1248.050253][T11928] addrconf_dad_work+0x736/0x2230 [ 1248.050253][T11928] ? kmsan_get_metadata+0xa4/0x120 [ 1248.152573][T11928] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 1248.152573][T11928] ? refcount_inc+0x120/0x120 [ 1248.152573][T11928] process_one_work+0xdc2/0x1820 [ 1248.152573][T11928] worker_thread+0x10f1/0x2290 [ 1248.152573][T11928] kthread+0x721/0x850 [ 1248.152573][T11928] ? worker_clr_flags+0x370/0x370 [ 1248.152573][T11928] ? kthread_blkcg+0x120/0x120 [ 1248.152573][T11928] ret_from_fork+0x1f/0x30 [ 1248.152573][T11928] [ 1248.152573][T11928] Kernel Offset: disabled [ 1248.152573][T11928] Rebooting in 86400 seconds..